Lookup for vulnerable packages by Package URL.

Purlpkg:generic/curl.se/curl@7.17.1
Typegeneric
Namespacecurl.se
Namecurl
Version7.17.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8.19.0
Latest_non_vulnerable_version8.19.0
Affected_by_vulnerabilities
0
url VCID-1k8f-qgcv-xkhb
vulnerability_id VCID-1k8f-qgcv-xkhb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-16T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.64552
published_at 2026-04-11T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-12T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.64512
published_at 2026-04-13T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64484
published_at 2026-04-02T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64515
published_at 2026-04-04T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-07T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-08T12:55:00Z
8
value 0.00469
scoring_system epss
scoring_elements 0.64536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
2
reference_url https://curl.se/docs/CVE-2022-27782.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27782.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1555796
reference_id
reference_type
scores
url https://hackerone.com/reports/1555796
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
reference_id 2082215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
21
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
22
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
23
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
24
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
25
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.1
purl pkg:generic/curl.se/curl@7.83.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-9nak-pscy-e7gs
11
vulnerability VCID-arjz-67yz-wkg9
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-ej47-4dcu-5fhy
15
vulnerability VCID-etzn-uhck-h7b2
16
vulnerability VCID-gnx2-djyk-uyaf
17
vulnerability VCID-gv7x-j8bz-wycc
18
vulnerability VCID-hrsy-694u-2fec
19
vulnerability VCID-m15r-v9sr-2bbn
20
vulnerability VCID-mkyr-w79c-qqfz
21
vulnerability VCID-ms2r-94ph-yyh3
22
vulnerability VCID-n57n-cymy-z7dr
23
vulnerability VCID-nvzd-v3bs-6qek
24
vulnerability VCID-pwn6-j8vf-rufk
25
vulnerability VCID-qdcn-2u3v-b3cv
26
vulnerability VCID-qpux-jh6k-8qhx
27
vulnerability VCID-s73y-y7v7-43cm
28
vulnerability VCID-syz5-5y6f-s7er
29
vulnerability VCID-t1fk-cbsx-j3gh
30
vulnerability VCID-t9p4-2x7v-yfaq
31
vulnerability VCID-tcqe-7skm-b3fz
32
vulnerability VCID-u4bx-xqb3-vuef
33
vulnerability VCID-vbbv-k1r7-kkas
34
vulnerability VCID-wgma-bycg-1qb1
35
vulnerability VCID-x57x-w8g8-7ybz
36
vulnerability VCID-xpss-yndr-mycj
37
vulnerability VCID-xzay-sjpy-3yce
38
vulnerability VCID-y4x5-n5m2-x7bq
39
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.1
aliases CVE-2022-27782
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb
1
url VCID-26ju-84rx-c7b9
vulnerability_id VCID-26ju-84rx-c7b9
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51472
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51614
published_at 2026-04-16T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51563
published_at 2026-04-08T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.5156
published_at 2026-04-09T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51604
published_at 2026-04-11T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51583
published_at 2026-04-12T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-13T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51523
published_at 2026-04-02T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51549
published_at 2026-04-04T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51509
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
3
reference_url https://curl.se/docs/CVE-2017-7407.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-7407.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
reference_id 1439190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
reference_id 859500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
reference_id CVE-2017-7407
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
12
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
13
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
14
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.54.0
purl pkg:generic/curl.se/curl@7.54.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-56wg-yafz-gkgx
9
vulnerability VCID-5n7a-9j23-e7dj
10
vulnerability VCID-6we4-n888-6qhe
11
vulnerability VCID-6yb7-t8qs-cbch
12
vulnerability VCID-75nw-4e2d-zqgg
13
vulnerability VCID-79sv-kzb5-hbc4
14
vulnerability VCID-7srk-hshe-h3f4
15
vulnerability VCID-7vt9-pf5q-uqb6
16
vulnerability VCID-8zks-th64-33b8
17
vulnerability VCID-9ggp-5wfj-ufcq
18
vulnerability VCID-9nak-pscy-e7gs
19
vulnerability VCID-ae59-w7a1-7keg
20
vulnerability VCID-arjz-67yz-wkg9
21
vulnerability VCID-bb2f-7qrm-1kca
22
vulnerability VCID-bhvd-ntxz-dkg4
23
vulnerability VCID-bv57-gvfs-qfhj
24
vulnerability VCID-cbah-e86c-w3fj
25
vulnerability VCID-cbph-fu9d-gbah
26
vulnerability VCID-cp4n-p2z3-43b4
27
vulnerability VCID-dc3c-3wab-57gh
28
vulnerability VCID-ddgz-rczw-jqfw
29
vulnerability VCID-dgtq-eaav-jyhf
30
vulnerability VCID-dhrf-2sz5-3bhf
31
vulnerability VCID-etzn-uhck-h7b2
32
vulnerability VCID-fp65-97n1-xuaj
33
vulnerability VCID-ggt7-eejg-xfb6
34
vulnerability VCID-gnx2-djyk-uyaf
35
vulnerability VCID-hrsy-694u-2fec
36
vulnerability VCID-hudt-78dw-tkf2
37
vulnerability VCID-j2qx-np45-4qdu
38
vulnerability VCID-jnfc-8f5d-pyh4
39
vulnerability VCID-ju6h-a1sz-f7e5
40
vulnerability VCID-mkyr-w79c-qqfz
41
vulnerability VCID-ms2r-94ph-yyh3
42
vulnerability VCID-n51k-39uk-auca
43
vulnerability VCID-ph5u-5j8n-4qah
44
vulnerability VCID-q229-ag6u-u3hv
45
vulnerability VCID-qbpd-star-6fgn
46
vulnerability VCID-qdcn-2u3v-b3cv
47
vulnerability VCID-qpfa-s6sd-8yct
48
vulnerability VCID-r7bh-7wur-xffs
49
vulnerability VCID-rmez-cwu2-2ya7
50
vulnerability VCID-s73y-y7v7-43cm
51
vulnerability VCID-sh5a-fmna-wffr
52
vulnerability VCID-syz5-5y6f-s7er
53
vulnerability VCID-t4gn-9fw8-gkc3
54
vulnerability VCID-tz47-j4ey-t7g6
55
vulnerability VCID-u4bx-xqb3-vuef
56
vulnerability VCID-u9jp-j1ds-73e7
57
vulnerability VCID-v3qf-6wju-1bg8
58
vulnerability VCID-w8ks-xk66-r3fm
59
vulnerability VCID-wrh2-77dv-hbdz
60
vulnerability VCID-wwam-tcmv-kqhc
61
vulnerability VCID-x57x-w8g8-7ybz
62
vulnerability VCID-y32p-52ps-4ug4
63
vulnerability VCID-y4x5-n5m2-x7bq
64
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.54.0
aliases CVE-2017-7407
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9
2
url VCID-29n1-4u2b-tkgj
vulnerability_id VCID-29n1-4u2b-tkgj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31838
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31828
published_at 2026-04-07T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31967
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.32009
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31909
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37128
published_at 2026-04-12T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37148
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
2
reference_url https://curl.se/docs/CVE-2018-16842.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16842.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
reference_id 1644124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
7
reference_url https://security.archlinux.org/ASA-201811-4
reference_id ASA-201811-4
reference_type
scores
url https://security.archlinux.org/ASA-201811-4
8
reference_url https://security.archlinux.org/AVG-795
reference_id AVG-795
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-795
9
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
10
reference_url https://access.redhat.com/errata/RHSA-2019:2181
reference_id RHSA-2019:2181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2181
11
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
12
reference_url https://usn.ubuntu.com/3805-2/
reference_id USN-3805-2
reference_type
scores
url https://usn.ubuntu.com/3805-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.62.0
purl pkg:generic/curl.se/curl@7.62.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-79sv-kzb5-hbc4
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-ac6r-spds-qbf5
15
vulnerability VCID-arjz-67yz-wkg9
16
vulnerability VCID-bb2f-7qrm-1kca
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-cp4n-p2z3-43b4
19
vulnerability VCID-d3s1-3qs7-2uhw
20
vulnerability VCID-dc3c-3wab-57gh
21
vulnerability VCID-ddgz-rczw-jqfw
22
vulnerability VCID-dhrf-2sz5-3bhf
23
vulnerability VCID-etzn-uhck-h7b2
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-v3qf-6wju-1bg8
48
vulnerability VCID-vbbv-k1r7-kkas
49
vulnerability VCID-w8ks-xk66-r3fm
50
vulnerability VCID-wwam-tcmv-kqhc
51
vulnerability VCID-x57x-w8g8-7ybz
52
vulnerability VCID-xzay-sjpy-3yce
53
vulnerability VCID-y32p-52ps-4ug4
54
vulnerability VCID-y4x5-n5m2-x7bq
55
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.62.0
aliases CVE-2018-16842
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj
3
url VCID-2cx5-1qnw-uufj
vulnerability_id VCID-2cx5-1qnw-uufj
summary curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17246
published_at 2026-04-04T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17194
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16802
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16891
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16949
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16923
published_at 2026-04-11T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19261
published_at 2026-04-13T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19223
published_at 2026-04-16T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
2
reference_url https://curl.se/docs/CVE-2026-1965.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
reference_id 2446448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
6
reference_url https://curl.se/docs/CVE-2026-1965.json
reference_id CVE-2026-1965.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.json
7
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
8
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.19.0
purl pkg:generic/curl.se/curl@8.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0
aliases CVE-2026-1965
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj
4
url VCID-2f5z-vxsz-yqdv
vulnerability_id VCID-2f5z-vxsz-yqdv
summary A vulnerability in cURL may allow for arbitrary file access.
references
0
reference_url http://curl.haxx.se/docs/adv_20090303.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20090303.html
1
reference_url http://curl.haxx.se/lxr/source/CHANGES
reference_id
reference_type
scores
url http://curl.haxx.se/lxr/source/CHANGES
2
reference_url http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
4
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0037
reference_id
reference_type
scores
0
value 0.09542
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-16T12:55:00Z
1
value 0.09542
scoring_system epss
scoring_elements 0.9285
published_at 2026-04-13T12:55:00Z
2
value 0.09542
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-01T12:55:00Z
3
value 0.09542
scoring_system epss
scoring_elements 0.9283
published_at 2026-04-02T12:55:00Z
4
value 0.09542
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-04T12:55:00Z
5
value 0.09542
scoring_system epss
scoring_elements 0.92832
published_at 2026-04-07T12:55:00Z
6
value 0.09542
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-08T12:55:00Z
7
value 0.09542
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0037
7
reference_url https://curl.se/docs/CVE-2009-0037.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2009-0037.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037
9
reference_url http://secunia.com/advisories/34138
reference_id
reference_type
scores
url http://secunia.com/advisories/34138
10
reference_url http://secunia.com/advisories/34202
reference_id
reference_type
scores
url http://secunia.com/advisories/34202
11
reference_url http://secunia.com/advisories/34237
reference_id
reference_type
scores
url http://secunia.com/advisories/34237
12
reference_url http://secunia.com/advisories/34251
reference_id
reference_type
scores
url http://secunia.com/advisories/34251
13
reference_url http://secunia.com/advisories/34255
reference_id
reference_type
scores
url http://secunia.com/advisories/34255
14
reference_url http://secunia.com/advisories/34259
reference_id
reference_type
scores
url http://secunia.com/advisories/34259
15
reference_url http://secunia.com/advisories/34399
reference_id
reference_type
scores
url http://secunia.com/advisories/34399
16
reference_url http://secunia.com/advisories/35766
reference_id
reference_type
scores
url http://secunia.com/advisories/35766
17
reference_url http://security.gentoo.org/glsa/glsa-200903-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-21.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49030
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49030
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074
22
reference_url http://support.apple.com/kb/HT4077
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4077
23
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042
24
reference_url http://www.debian.org/security/2009/dsa-1738
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1738
25
reference_url http://www.redhat.com/support/errata/RHSA-2009-0341.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0341.html
26
reference_url http://www.securityfocus.com/archive/1/501757/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501757/100/0/threaded
27
reference_url http://www.securityfocus.com/archive/1/504849/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/504849/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/33962
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33962
29
reference_url http://www.securitytracker.com/id?1021783
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021783
30
reference_url http://www.ubuntu.com/usn/USN-726-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-726-1
31
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
32
reference_url http://www.vupen.com/english/advisories/2009/0581
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0581
33
reference_url http://www.vupen.com/english/advisories/2009/1865
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1865
34
reference_url http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
reference_id
reference_type
scores
url http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
35
reference_url http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf
reference_id
reference_type
scores
url http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=485271
reference_id 485271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=485271
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423
reference_id 518423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0037
reference_id CVE-2009-0037
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0037
119
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt
reference_id CVE-2009-0037;OSVDB-53572
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt
120
reference_url https://www.securityfocus.com/bid/33962/info
reference_id CVE-2009-0037;OSVDB-53572
reference_type exploit
scores
url https://www.securityfocus.com/bid/33962/info
121
reference_url https://security.gentoo.org/glsa/200903-21
reference_id GLSA-200903-21
reference_type
scores
url https://security.gentoo.org/glsa/200903-21
122
reference_url https://access.redhat.com/errata/RHSA-2009:0341
reference_id RHSA-2009:0341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0341
123
reference_url https://usn.ubuntu.com/726-1/
reference_id USN-726-1
reference_type
scores
url https://usn.ubuntu.com/726-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.19.4
purl pkg:generic/curl.se/curl@7.19.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mk9-5buz-puh5
9
vulnerability VCID-6muy-xpdq-9kg8
10
vulnerability VCID-6we4-n888-6qhe
11
vulnerability VCID-6yb7-t8qs-cbch
12
vulnerability VCID-7c8e-eaqy-akeu
13
vulnerability VCID-7srk-hshe-h3f4
14
vulnerability VCID-7xxh-66ys-4bhw
15
vulnerability VCID-87qu-j64w-p7fj
16
vulnerability VCID-8zks-th64-33b8
17
vulnerability VCID-9ggp-5wfj-ufcq
18
vulnerability VCID-9nak-pscy-e7gs
19
vulnerability VCID-ae59-w7a1-7keg
20
vulnerability VCID-arjz-67yz-wkg9
21
vulnerability VCID-b2ef-zj3u-rbhy
22
vulnerability VCID-c2na-7q9e-47am
23
vulnerability VCID-c6dk-7gj6-7far
24
vulnerability VCID-cbah-e86c-w3fj
25
vulnerability VCID-ddgz-rczw-jqfw
26
vulnerability VCID-dgtq-eaav-jyhf
27
vulnerability VCID-dj5e-62rt-hkex
28
vulnerability VCID-dzzd-afgu-3fcy
29
vulnerability VCID-e1yx-dxa6-1bba
30
vulnerability VCID-e58m-g37d-9fd6
31
vulnerability VCID-eer3-29q8-sbgq
32
vulnerability VCID-exhe-cmqf-duad
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hudt-78dw-tkf2
38
vulnerability VCID-jeqg-g3en-5udw
39
vulnerability VCID-jqqf-gmd3-ubcd
40
vulnerability VCID-jtw4-af4y-nkbk
41
vulnerability VCID-k8kj-q1je-f7bt
42
vulnerability VCID-mkyr-w79c-qqfz
43
vulnerability VCID-ph5u-5j8n-4qah
44
vulnerability VCID-prff-34kh-kbat
45
vulnerability VCID-r3ny-7kn7-ukaa
46
vulnerability VCID-r7bh-7wur-xffs
47
vulnerability VCID-rmez-cwu2-2ya7
48
vulnerability VCID-s73y-y7v7-43cm
49
vulnerability VCID-sknq-8mm1-6qfe
50
vulnerability VCID-snaz-pg1h-8kew
51
vulnerability VCID-syz5-5y6f-s7er
52
vulnerability VCID-tmv3-fzje-sbck
53
vulnerability VCID-tz47-j4ey-t7g6
54
vulnerability VCID-vxpj-xygq-9be2
55
vulnerability VCID-vyk2-s5ut-ubbz
56
vulnerability VCID-wc8j-qyp4-tqbd
57
vulnerability VCID-wwam-tcmv-kqhc
58
vulnerability VCID-xspf-45t1-2uhf
59
vulnerability VCID-y32p-52ps-4ug4
60
vulnerability VCID-y4x5-n5m2-x7bq
61
vulnerability VCID-yxks-8529-23bj
62
vulnerability VCID-z49y-v1gh-h7gj
63
vulnerability VCID-z8h3-fdj8-xuaa
64
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.4
aliases CVE-2009-0037
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv
5
url VCID-2xmp-jc8v-bucb
vulnerability_id VCID-2xmp-jc8v-bucb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-08T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43779
published_at 2026-04-02T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43736
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52356
published_at 2026-04-16T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52298
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52348
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52332
published_at 2026-04-12T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
2
reference_url https://curl.se/docs/CVE-2022-35252.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-35252.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1613943
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://hackerone.com/reports/1613943
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
reference_id 1018831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/21
reference_id 21
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
reference_id 2120718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://support.apple.com/kb/HT213603
reference_id HT213603
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213603
12
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213604
13
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
14
reference_url https://security.netapp.com/advisory/ntap-20220930-0005/
reference_id ntap-20220930-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.netapp.com/advisory/ntap-20220930-0005/
15
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
16
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
17
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
18
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
19
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
20
reference_url https://usn.ubuntu.com/5587-1/
reference_id USN-5587-1
reference_type
scores
url https://usn.ubuntu.com/5587-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.85.0
purl pkg:generic/curl.se/curl@7.85.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-9nak-pscy-e7gs
11
vulnerability VCID-arjz-67yz-wkg9
12
vulnerability VCID-bz4u-6rft-s3a8
13
vulnerability VCID-cbah-e86c-w3fj
14
vulnerability VCID-ddgz-rczw-jqfw
15
vulnerability VCID-ej47-4dcu-5fhy
16
vulnerability VCID-etzn-uhck-h7b2
17
vulnerability VCID-gnx2-djyk-uyaf
18
vulnerability VCID-hrsy-694u-2fec
19
vulnerability VCID-m15r-v9sr-2bbn
20
vulnerability VCID-mkyr-w79c-qqfz
21
vulnerability VCID-ms2r-94ph-yyh3
22
vulnerability VCID-n57n-cymy-z7dr
23
vulnerability VCID-nvzd-v3bs-6qek
24
vulnerability VCID-pwn6-j8vf-rufk
25
vulnerability VCID-qdcn-2u3v-b3cv
26
vulnerability VCID-qpux-jh6k-8qhx
27
vulnerability VCID-rg54-svzj-x7f9
28
vulnerability VCID-s73y-y7v7-43cm
29
vulnerability VCID-syz5-5y6f-s7er
30
vulnerability VCID-t9p4-2x7v-yfaq
31
vulnerability VCID-tcqe-7skm-b3fz
32
vulnerability VCID-tha5-fv3w-sub6
33
vulnerability VCID-u4bx-xqb3-vuef
34
vulnerability VCID-vbbv-k1r7-kkas
35
vulnerability VCID-wgma-bycg-1qb1
36
vulnerability VCID-x57x-w8g8-7ybz
37
vulnerability VCID-xpss-yndr-mycj
38
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.85.0
aliases CVE-2022-35252
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb
6
url VCID-3sy2-4f3g-zkac
vulnerability_id VCID-3sy2-4f3g-zkac
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53851
published_at 2026-04-16T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53847
published_at 2026-04-11T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.5383
published_at 2026-04-12T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.53814
published_at 2026-04-13T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53749
published_at 2026-04-02T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53775
published_at 2026-04-04T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.53748
published_at 2026-04-07T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53801
published_at 2026-04-08T12:55:00Z
8
value 0.00306
scoring_system epss
scoring_elements 0.53799
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
2
reference_url https://curl.se/docs/CVE-2022-27774.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27774.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1543773
reference_id
reference_type
scores
url https://hackerone.com/reports/1543773
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
reference_id 1010254
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
reference_id 2077547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
25
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
26
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.0
purl pkg:generic/curl.se/curl@7.83.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-47qb-2qkw-1qej
4
vulnerability VCID-4e1k-7bj9-hfch
5
vulnerability VCID-4gze-cwtp-2bgr
6
vulnerability VCID-6ge5-86tg-dydf
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hjkx-6yep-mkde
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-m15r-v9sr-2bbn
24
vulnerability VCID-mkyr-w79c-qqfz
25
vulnerability VCID-ms2r-94ph-yyh3
26
vulnerability VCID-n57n-cymy-z7dr
27
vulnerability VCID-nvzd-v3bs-6qek
28
vulnerability VCID-pwn6-j8vf-rufk
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-rhxh-77pj-1bfy
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-syz5-5y6f-s7er
34
vulnerability VCID-t1fk-cbsx-j3gh
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-v9n1-d6xt-6ubn
39
vulnerability VCID-vbbv-k1r7-kkas
40
vulnerability VCID-wgma-bycg-1qb1
41
vulnerability VCID-x57x-w8g8-7ybz
42
vulnerability VCID-xpss-yndr-mycj
43
vulnerability VCID-xzay-sjpy-3yce
44
vulnerability VCID-y4x5-n5m2-x7bq
45
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0
aliases CVE-2022-27774
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac
7
url VCID-47qb-2qkw-1qej
vulnerability_id VCID-47qb-2qkw-1qej
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53057
published_at 2026-04-16T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.52966
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.52991
published_at 2026-04-04T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.52959
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53009
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53003
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53052
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53037
published_at 2026-04-12T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.5302
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
2
reference_url https://curl.se/docs/CVE-2023-28321.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28321.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1950627
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://hackerone.com/reports/1950627
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
reference_id 2196786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4523
reference_id RHSA-2023:4523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4523
20
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
21
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
22
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
23
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
24
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
25
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28321
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej
8
url VCID-4mk9-5buz-puh5
vulnerability_id VCID-4mk9-5buz-puh5
summary
Multiple vulnerabilities have been discovered in cURL, the worst of
    which could lead to man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0139
reference_id
reference_type
scores
0
value 0.01203
scoring_system epss
scoring_elements 0.7896
published_at 2026-04-16T12:55:00Z
1
value 0.01203
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-01T12:55:00Z
2
value 0.01203
scoring_system epss
scoring_elements 0.78891
published_at 2026-04-02T12:55:00Z
3
value 0.01203
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-04T12:55:00Z
4
value 0.01203
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-07T12:55:00Z
5
value 0.01203
scoring_system epss
scoring_elements 0.78927
published_at 2026-04-08T12:55:00Z
6
value 0.01203
scoring_system epss
scoring_elements 0.78933
published_at 2026-04-09T12:55:00Z
7
value 0.01203
scoring_system epss
scoring_elements 0.78956
published_at 2026-04-11T12:55:00Z
8
value 0.01203
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-12T12:55:00Z
9
value 0.01203
scoring_system epss
scoring_elements 0.78931
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0139
2
reference_url https://curl.se/docs/CVE-2014-0139.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0139.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079149
reference_id 1079149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079149
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
reference_id 742728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
7
reference_url https://security.gentoo.org/glsa/201406-21
reference_id GLSA-201406-21
reference_type
scores
url https://security.gentoo.org/glsa/201406-21
8
reference_url https://usn.ubuntu.com/2167-1/
reference_id USN-2167-1
reference_type
scores
url https://usn.ubuntu.com/2167-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.36.0
purl pkg:generic/curl.se/curl@7.36.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-dzzd-afgu-3fcy
41
vulnerability VCID-e58m-g37d-9fd6
42
vulnerability VCID-eap9-v2gp-fqgh
43
vulnerability VCID-eer3-29q8-sbgq
44
vulnerability VCID-ekav-zg3k-v3ea
45
vulnerability VCID-etzn-uhck-h7b2
46
vulnerability VCID-fnj3-2du1-4bhx
47
vulnerability VCID-fp65-97n1-xuaj
48
vulnerability VCID-ggt7-eejg-xfb6
49
vulnerability VCID-gnx2-djyk-uyaf
50
vulnerability VCID-hj8v-tgnn-mfdw
51
vulnerability VCID-hudt-78dw-tkf2
52
vulnerability VCID-j2cq-q3r9-jfcp
53
vulnerability VCID-j2qx-np45-4qdu
54
vulnerability VCID-jeqg-g3en-5udw
55
vulnerability VCID-jqqf-gmd3-ubcd
56
vulnerability VCID-jtw4-af4y-nkbk
57
vulnerability VCID-ju6h-a1sz-f7e5
58
vulnerability VCID-k8kj-q1je-f7bt
59
vulnerability VCID-mkyr-w79c-qqfz
60
vulnerability VCID-ms2r-94ph-yyh3
61
vulnerability VCID-ph5u-5j8n-4qah
62
vulnerability VCID-q229-ag6u-u3hv
63
vulnerability VCID-qbpd-star-6fgn
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-sknq-8mm1-6qfe
69
vulnerability VCID-snaz-pg1h-8kew
70
vulnerability VCID-syz5-5y6f-s7er
71
vulnerability VCID-t4gn-9fw8-gkc3
72
vulnerability VCID-t753-w1ha-kqaz
73
vulnerability VCID-tmv3-fzje-sbck
74
vulnerability VCID-tz47-j4ey-t7g6
75
vulnerability VCID-v3qf-6wju-1bg8
76
vulnerability VCID-vxpj-xygq-9be2
77
vulnerability VCID-vyk2-s5ut-ubbz
78
vulnerability VCID-w8ks-xk66-r3fm
79
vulnerability VCID-wc8j-qyp4-tqbd
80
vulnerability VCID-wh98-pw9h-cyfx
81
vulnerability VCID-wrh2-77dv-hbdz
82
vulnerability VCID-wwam-tcmv-kqhc
83
vulnerability VCID-x57x-w8g8-7ybz
84
vulnerability VCID-xspf-45t1-2uhf
85
vulnerability VCID-y32p-52ps-4ug4
86
vulnerability VCID-y4x5-n5m2-x7bq
87
vulnerability VCID-yvdd-ataf-ckf1
88
vulnerability VCID-yxks-8529-23bj
89
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0
aliases CVE-2014-0139
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5
9
url VCID-6muy-xpdq-9kg8
vulnerability_id VCID-6muy-xpdq-9kg8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
reference_id
reference_type
scores
0
value 0.0413
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-01T12:55:00Z
1
value 0.0413
scoring_system epss
scoring_elements 0.88658
published_at 2026-04-16T12:55:00Z
2
value 0.0413
scoring_system epss
scoring_elements 0.88598
published_at 2026-04-02T12:55:00Z
3
value 0.0413
scoring_system epss
scoring_elements 0.88616
published_at 2026-04-04T12:55:00Z
4
value 0.0413
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-07T12:55:00Z
5
value 0.0413
scoring_system epss
scoring_elements 0.88635
published_at 2026-04-08T12:55:00Z
6
value 0.0413
scoring_system epss
scoring_elements 0.8864
published_at 2026-04-09T12:55:00Z
7
value 0.0413
scoring_system epss
scoring_elements 0.88652
published_at 2026-04-11T12:55:00Z
8
value 0.0413
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
2
reference_url https://curl.se/docs/CVE-2016-8616.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8616.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
reference_id 1388371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8616
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8
10
url VCID-6we4-n888-6qhe
vulnerability_id VCID-6we4-n888-6qhe
summary libcurl: Buffer Overflow in libcurl via zlib Integer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.6327
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-09T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-11T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-16T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-02T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63823
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63815
published_at 2026-04-04T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63772
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
2
reference_url https://curl.se/docs/CVE-2025-0725.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2956023
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://hackerone.com/reports/2956023
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
reference_id 2343899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
7
reference_url https://curl.se/docs/CVE-2025-0725.json
reference_id CVE-2025-0725.json
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.json
fixed_packages
0
url pkg:generic/curl.se/curl@8.12.0
purl pkg:generic/curl.se/curl@8.12.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-8zks-th64-33b8
4
vulnerability VCID-9mjz-apkm-g7h1
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-kt4b-7ffh-4bch
8
vulnerability VCID-mkyr-w79c-qqfz
9
vulnerability VCID-nvzd-v3bs-6qek
10
vulnerability VCID-qpux-jh6k-8qhx
11
vulnerability VCID-vbbv-k1r7-kkas
12
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0
aliases CVE-2025-0725
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe
11
url VCID-6yb7-t8qs-cbch
vulnerability_id VCID-6yb7-t8qs-cbch
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
reference_id
reference_type
scores
0
value 0.03344
scoring_system epss
scoring_elements 0.87269
published_at 2026-04-02T12:55:00Z
1
value 0.03344
scoring_system epss
scoring_elements 0.87259
published_at 2026-04-01T12:55:00Z
2
value 0.03344
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-08T12:55:00Z
3
value 0.03344
scoring_system epss
scoring_elements 0.87283
published_at 2026-04-07T12:55:00Z
4
value 0.03344
scoring_system epss
scoring_elements 0.87285
published_at 2026-04-04T12:55:00Z
5
value 0.03871
scoring_system epss
scoring_elements 0.88245
published_at 2026-04-16T12:55:00Z
6
value 0.03871
scoring_system epss
scoring_elements 0.88227
published_at 2026-04-09T12:55:00Z
7
value 0.03871
scoring_system epss
scoring_elements 0.88238
published_at 2026-04-11T12:55:00Z
8
value 0.03871
scoring_system epss
scoring_elements 0.88231
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
2
reference_url https://curl.se/docs/CVE-2018-1000007.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000007.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
reference_id 1537125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
6
reference_url https://security.archlinux.org/ASA-201801-20
reference_id ASA-201801-20
reference_type
scores
url https://security.archlinux.org/ASA-201801-20
7
reference_url https://security.archlinux.org/ASA-201801-22
reference_id ASA-201801-22
reference_type
scores
url https://security.archlinux.org/ASA-201801-22
8
reference_url https://security.archlinux.org/ASA-201801-23
reference_id ASA-201801-23
reference_type
scores
url https://security.archlinux.org/ASA-201801-23
9
reference_url https://security.archlinux.org/ASA-201801-24
reference_id ASA-201801-24
reference_type
scores
url https://security.archlinux.org/ASA-201801-24
10
reference_url https://security.archlinux.org/ASA-201801-25
reference_id ASA-201801-25
reference_type
scores
url https://security.archlinux.org/ASA-201801-25
11
reference_url https://security.archlinux.org/ASA-201801-26
reference_id ASA-201801-26
reference_type
scores
url https://security.archlinux.org/ASA-201801-26
12
reference_url https://security.archlinux.org/AVG-593
reference_id AVG-593
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-593
13
reference_url https://security.archlinux.org/AVG-594
reference_id AVG-594
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-594
14
reference_url https://security.archlinux.org/AVG-595
reference_id AVG-595
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-595
15
reference_url https://security.archlinux.org/AVG-596
reference_id AVG-596
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-596
16
reference_url https://security.archlinux.org/AVG-597
reference_id AVG-597
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-597
17
reference_url https://security.archlinux.org/AVG-598
reference_id AVG-598
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-598
18
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
19
reference_url https://usn.ubuntu.com/3554-1/
reference_id USN-3554-1
reference_type
scores
url https://usn.ubuntu.com/3554-1/
20
reference_url https://usn.ubuntu.com/3554-2/
reference_id USN-3554-2
reference_type
scores
url https://usn.ubuntu.com/3554-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.58.0
purl pkg:generic/curl.se/curl@7.58.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-75nw-4e2d-zqgg
11
vulnerability VCID-79sv-kzb5-hbc4
12
vulnerability VCID-7srk-hshe-h3f4
13
vulnerability VCID-7vt9-pf5q-uqb6
14
vulnerability VCID-8zks-th64-33b8
15
vulnerability VCID-9ggp-5wfj-ufcq
16
vulnerability VCID-9nak-pscy-e7gs
17
vulnerability VCID-arjz-67yz-wkg9
18
vulnerability VCID-bb2f-7qrm-1kca
19
vulnerability VCID-bv57-gvfs-qfhj
20
vulnerability VCID-cbah-e86c-w3fj
21
vulnerability VCID-cbph-fu9d-gbah
22
vulnerability VCID-cp4n-p2z3-43b4
23
vulnerability VCID-dc3c-3wab-57gh
24
vulnerability VCID-ddgz-rczw-jqfw
25
vulnerability VCID-dgtq-eaav-jyhf
26
vulnerability VCID-dhrf-2sz5-3bhf
27
vulnerability VCID-etzn-uhck-h7b2
28
vulnerability VCID-ggt7-eejg-xfb6
29
vulnerability VCID-gnx2-djyk-uyaf
30
vulnerability VCID-hrsy-694u-2fec
31
vulnerability VCID-hudt-78dw-tkf2
32
vulnerability VCID-ju6h-a1sz-f7e5
33
vulnerability VCID-krgt-drpz-y7cy
34
vulnerability VCID-mkyr-w79c-qqfz
35
vulnerability VCID-ms2r-94ph-yyh3
36
vulnerability VCID-n51k-39uk-auca
37
vulnerability VCID-n57n-cymy-z7dr
38
vulnerability VCID-nvzd-v3bs-6qek
39
vulnerability VCID-ph5u-5j8n-4qah
40
vulnerability VCID-q229-ag6u-u3hv
41
vulnerability VCID-qbpd-star-6fgn
42
vulnerability VCID-qdcn-2u3v-b3cv
43
vulnerability VCID-qpfa-s6sd-8yct
44
vulnerability VCID-r7bh-7wur-xffs
45
vulnerability VCID-rmez-cwu2-2ya7
46
vulnerability VCID-s73y-y7v7-43cm
47
vulnerability VCID-sh5a-fmna-wffr
48
vulnerability VCID-syz5-5y6f-s7er
49
vulnerability VCID-t4gn-9fw8-gkc3
50
vulnerability VCID-tz47-j4ey-t7g6
51
vulnerability VCID-u4bx-xqb3-vuef
52
vulnerability VCID-v3qf-6wju-1bg8
53
vulnerability VCID-vbbv-k1r7-kkas
54
vulnerability VCID-vr9x-yqsd-6fc8
55
vulnerability VCID-w8ks-xk66-r3fm
56
vulnerability VCID-wwam-tcmv-kqhc
57
vulnerability VCID-x57x-w8g8-7ybz
58
vulnerability VCID-xzay-sjpy-3yce
59
vulnerability VCID-y32p-52ps-4ug4
60
vulnerability VCID-y4x5-n5m2-x7bq
61
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.58.0
aliases CVE-2018-1000007
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch
12
url VCID-7c8e-eaqy-akeu
vulnerability_id VCID-7c8e-eaqy-akeu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3153
reference_id
reference_type
scores
0
value 0.0976
scoring_system epss
scoring_elements 0.9296
published_at 2026-04-16T12:55:00Z
1
value 0.0976
scoring_system epss
scoring_elements 0.92922
published_at 2026-04-01T12:55:00Z
2
value 0.0976
scoring_system epss
scoring_elements 0.9293
published_at 2026-04-02T12:55:00Z
3
value 0.0976
scoring_system epss
scoring_elements 0.92934
published_at 2026-04-04T12:55:00Z
4
value 0.0976
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-07T12:55:00Z
5
value 0.0976
scoring_system epss
scoring_elements 0.92941
published_at 2026-04-08T12:55:00Z
6
value 0.0976
scoring_system epss
scoring_elements 0.92945
published_at 2026-04-09T12:55:00Z
7
value 0.0976
scoring_system epss
scoring_elements 0.9295
published_at 2026-04-13T12:55:00Z
8
value 0.0976
scoring_system epss
scoring_elements 0.92949
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3153
2
reference_url https://curl.se/docs/CVE-2015-3153.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3153.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1217341
reference_id 1217341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1217341
5
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.42.1
purl pkg:generic/curl.se/curl@7.42.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-7xxh-66ys-4bhw
20
vulnerability VCID-8zks-th64-33b8
21
vulnerability VCID-9ggp-5wfj-ufcq
22
vulnerability VCID-9nak-pscy-e7gs
23
vulnerability VCID-a3v7-ptf1-6qgd
24
vulnerability VCID-a9b6-m25r-kygw
25
vulnerability VCID-ae59-w7a1-7keg
26
vulnerability VCID-arjz-67yz-wkg9
27
vulnerability VCID-b2ef-zj3u-rbhy
28
vulnerability VCID-bb2f-7qrm-1kca
29
vulnerability VCID-bgtv-jrna-9yb3
30
vulnerability VCID-bhvd-ntxz-dkg4
31
vulnerability VCID-bv57-gvfs-qfhj
32
vulnerability VCID-c6dk-7gj6-7far
33
vulnerability VCID-cbah-e86c-w3fj
34
vulnerability VCID-cbph-fu9d-gbah
35
vulnerability VCID-cp4n-p2z3-43b4
36
vulnerability VCID-dc3c-3wab-57gh
37
vulnerability VCID-ddgz-rczw-jqfw
38
vulnerability VCID-dgtq-eaav-jyhf
39
vulnerability VCID-e58m-g37d-9fd6
40
vulnerability VCID-eap9-v2gp-fqgh
41
vulnerability VCID-etzn-uhck-h7b2
42
vulnerability VCID-fnj3-2du1-4bhx
43
vulnerability VCID-fp65-97n1-xuaj
44
vulnerability VCID-ggt7-eejg-xfb6
45
vulnerability VCID-gnx2-djyk-uyaf
46
vulnerability VCID-hj8v-tgnn-mfdw
47
vulnerability VCID-hrsy-694u-2fec
48
vulnerability VCID-hudt-78dw-tkf2
49
vulnerability VCID-j2cq-q3r9-jfcp
50
vulnerability VCID-j2qx-np45-4qdu
51
vulnerability VCID-jeqg-g3en-5udw
52
vulnerability VCID-jqqf-gmd3-ubcd
53
vulnerability VCID-jtw4-af4y-nkbk
54
vulnerability VCID-ju6h-a1sz-f7e5
55
vulnerability VCID-k8kj-q1je-f7bt
56
vulnerability VCID-mkyr-w79c-qqfz
57
vulnerability VCID-ms2r-94ph-yyh3
58
vulnerability VCID-n51k-39uk-auca
59
vulnerability VCID-ph5u-5j8n-4qah
60
vulnerability VCID-q229-ag6u-u3hv
61
vulnerability VCID-qbpd-star-6fgn
62
vulnerability VCID-r447-deb8-2ydj
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-snaz-pg1h-8kew
68
vulnerability VCID-syz5-5y6f-s7er
69
vulnerability VCID-t4gn-9fw8-gkc3
70
vulnerability VCID-tz47-j4ey-t7g6
71
vulnerability VCID-v3qf-6wju-1bg8
72
vulnerability VCID-vxpj-xygq-9be2
73
vulnerability VCID-vyk2-s5ut-ubbz
74
vulnerability VCID-w8ks-xk66-r3fm
75
vulnerability VCID-wc8j-qyp4-tqbd
76
vulnerability VCID-wrh2-77dv-hbdz
77
vulnerability VCID-wwam-tcmv-kqhc
78
vulnerability VCID-x57x-w8g8-7ybz
79
vulnerability VCID-y32p-52ps-4ug4
80
vulnerability VCID-y4x5-n5m2-x7bq
81
vulnerability VCID-yubp-g4rt-c3e6
82
vulnerability VCID-yvdd-ataf-ckf1
83
vulnerability VCID-yxks-8529-23bj
84
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.1
aliases CVE-2015-3153
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu
13
url VCID-7srk-hshe-h3f4
vulnerability_id VCID-7srk-hshe-h3f4
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03588
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03622
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.036
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03599
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03574
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05601
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
2
reference_url https://curl.se/docs/CVE-2023-27538.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27538.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1898475
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://hackerone.com/reports/1898475
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
reference_id 2179103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
reference_id CVE-2023-27538
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
9
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.gentoo.org/glsa/202310-12
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
11
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
12
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
13
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27538
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4
14
url VCID-7xxh-66ys-4bhw
vulnerability_id VCID-7xxh-66ys-4bhw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83461
published_at 2026-04-01T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.8356
published_at 2026-04-16T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83529
published_at 2026-04-12T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-13T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83474
published_at 2026-04-02T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-04T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-07T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83511
published_at 2026-04-08T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-09T12:55:00Z
9
value 0.01968
scoring_system epss
scoring_elements 0.83535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
2
reference_url https://curl.se/docs/CVE-2016-5419.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5419.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
reference_id 1362183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.50.1
purl pkg:generic/curl.se/curl@7.50.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-8zks-th64-33b8
20
vulnerability VCID-9ggp-5wfj-ufcq
21
vulnerability VCID-9nak-pscy-e7gs
22
vulnerability VCID-a3v7-ptf1-6qgd
23
vulnerability VCID-a9b6-m25r-kygw
24
vulnerability VCID-ae59-w7a1-7keg
25
vulnerability VCID-arjz-67yz-wkg9
26
vulnerability VCID-bb2f-7qrm-1kca
27
vulnerability VCID-bhvd-ntxz-dkg4
28
vulnerability VCID-bv57-gvfs-qfhj
29
vulnerability VCID-c6dk-7gj6-7far
30
vulnerability VCID-cbah-e86c-w3fj
31
vulnerability VCID-cbph-fu9d-gbah
32
vulnerability VCID-cp4n-p2z3-43b4
33
vulnerability VCID-dc3c-3wab-57gh
34
vulnerability VCID-ddgz-rczw-jqfw
35
vulnerability VCID-dgtq-eaav-jyhf
36
vulnerability VCID-e58m-g37d-9fd6
37
vulnerability VCID-etzn-uhck-h7b2
38
vulnerability VCID-fnj3-2du1-4bhx
39
vulnerability VCID-fp65-97n1-xuaj
40
vulnerability VCID-ggt7-eejg-xfb6
41
vulnerability VCID-gnx2-djyk-uyaf
42
vulnerability VCID-hj8v-tgnn-mfdw
43
vulnerability VCID-hrsy-694u-2fec
44
vulnerability VCID-hudt-78dw-tkf2
45
vulnerability VCID-j2cq-q3r9-jfcp
46
vulnerability VCID-j2qx-np45-4qdu
47
vulnerability VCID-jnfc-8f5d-pyh4
48
vulnerability VCID-jqqf-gmd3-ubcd
49
vulnerability VCID-jtw4-af4y-nkbk
50
vulnerability VCID-ju6h-a1sz-f7e5
51
vulnerability VCID-k8kj-q1je-f7bt
52
vulnerability VCID-mkyr-w79c-qqfz
53
vulnerability VCID-ms2r-94ph-yyh3
54
vulnerability VCID-n51k-39uk-auca
55
vulnerability VCID-ph5u-5j8n-4qah
56
vulnerability VCID-q229-ag6u-u3hv
57
vulnerability VCID-qbpd-star-6fgn
58
vulnerability VCID-qdcn-2u3v-b3cv
59
vulnerability VCID-qpfa-s6sd-8yct
60
vulnerability VCID-r7bh-7wur-xffs
61
vulnerability VCID-rmez-cwu2-2ya7
62
vulnerability VCID-s73y-y7v7-43cm
63
vulnerability VCID-sh5a-fmna-wffr
64
vulnerability VCID-syz5-5y6f-s7er
65
vulnerability VCID-t4gn-9fw8-gkc3
66
vulnerability VCID-tz47-j4ey-t7g6
67
vulnerability VCID-u4bx-xqb3-vuef
68
vulnerability VCID-v3qf-6wju-1bg8
69
vulnerability VCID-vxpj-xygq-9be2
70
vulnerability VCID-vyk2-s5ut-ubbz
71
vulnerability VCID-w8ks-xk66-r3fm
72
vulnerability VCID-wrh2-77dv-hbdz
73
vulnerability VCID-wwam-tcmv-kqhc
74
vulnerability VCID-x57x-w8g8-7ybz
75
vulnerability VCID-y32p-52ps-4ug4
76
vulnerability VCID-y4x5-n5m2-x7bq
77
vulnerability VCID-yvdd-ataf-ckf1
78
vulnerability VCID-yxks-8529-23bj
79
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1
aliases CVE-2016-5419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw
15
url VCID-8zks-th64-33b8
vulnerability_id VCID-8zks-th64-33b8
summary curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03044
published_at 2026-04-11T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03051
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03081
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03056
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03053
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03037
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03659
published_at 2026-04-16T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03709
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03683
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
2
reference_url https://curl.se/docs/CVE-2026-3784.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3584903
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://hackerone.com/reports/3584903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
reference_id 2446449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
7
reference_url https://curl.se/docs/CVE-2026-3784.json
reference_id CVE-2026-3784.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.json
8
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
9
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.19.0
purl pkg:generic/curl.se/curl@8.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0
aliases CVE-2026-3784
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8
16
url VCID-9ggp-5wfj-ufcq
vulnerability_id VCID-9ggp-5wfj-ufcq
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42409
published_at 2026-04-13T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42428
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42458
published_at 2026-04-16T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42397
published_at 2026-04-07T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42447
published_at 2026-04-08T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42455
published_at 2026-04-09T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42477
published_at 2026-04-11T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.4244
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
2
reference_url https://curl.se/docs/CVE-2022-43552.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-43552.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1764858
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://hackerone.com/reports/1764858
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
reference_id 1026830
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
8
reference_url http://seclists.org/fulldisclosure/2023/Mar/17
reference_id 17
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url http://seclists.org/fulldisclosure/2023/Mar/17
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
reference_id 2152652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://support.apple.com/kb/HT213670
reference_id HT213670
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://support.apple.com/kb/HT213670
12
reference_url https://security.netapp.com/advisory/ntap-20230214-0002/
reference_id ntap-20230214-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.netapp.com/advisory/ntap-20230214-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
14
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
15
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
16
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
17
reference_url https://access.redhat.com/errata/RHSA-2023:7743
reference_id RHSA-2023:7743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7743
18
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
19
reference_url https://usn.ubuntu.com/5788-1/
reference_id USN-5788-1
reference_type
scores
url https://usn.ubuntu.com/5788-1/
20
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.87.0
purl pkg:generic/curl.se/curl@7.87.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-5xp7-mcsa-uqd4
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-arjz-67yz-wkg9
11
vulnerability VCID-bz4u-6rft-s3a8
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-etzn-uhck-h7b2
15
vulnerability VCID-gnx2-djyk-uyaf
16
vulnerability VCID-hrsy-694u-2fec
17
vulnerability VCID-m15r-v9sr-2bbn
18
vulnerability VCID-mkyr-w79c-qqfz
19
vulnerability VCID-ms2r-94ph-yyh3
20
vulnerability VCID-n57n-cymy-z7dr
21
vulnerability VCID-nvzd-v3bs-6qek
22
vulnerability VCID-pwn6-j8vf-rufk
23
vulnerability VCID-qdcn-2u3v-b3cv
24
vulnerability VCID-qpux-jh6k-8qhx
25
vulnerability VCID-s73y-y7v7-43cm
26
vulnerability VCID-syz5-5y6f-s7er
27
vulnerability VCID-t9p4-2x7v-yfaq
28
vulnerability VCID-tcqe-7skm-b3fz
29
vulnerability VCID-tha5-fv3w-sub6
30
vulnerability VCID-u4bx-xqb3-vuef
31
vulnerability VCID-vbbv-k1r7-kkas
32
vulnerability VCID-wgma-bycg-1qb1
33
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.87.0
aliases CVE-2022-43552
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq
17
url VCID-9nak-pscy-e7gs
vulnerability_id VCID-9nak-pscy-e7gs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82218
published_at 2026-04-16T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-12T12:55:00Z
2
value 0.01681
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-13T12:55:00Z
3
value 0.02591
scoring_system epss
scoring_elements 0.8553
published_at 2026-04-02T12:55:00Z
4
value 0.02591
scoring_system epss
scoring_elements 0.85547
published_at 2026-04-04T12:55:00Z
5
value 0.02753
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-09T12:55:00Z
6
value 0.02753
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-11T12:55:00Z
7
value 0.02753
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-08T12:55:00Z
8
value 0.02753
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
2
reference_url https://curl.se/docs/CVE-2022-32221.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32221.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1704017
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://hackerone.com/reports/1704017
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
reference_id 2135411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
10
reference_url http://www.openwall.com/lists/oss-security/2023/05/17/4
reference_id 4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://www.openwall.com/lists/oss-security/2023/05/17/4
11
reference_url https://www.debian.org/security/2023/dsa-5330
reference_id dsa-5330
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://www.debian.org/security/2023/dsa-5330
12
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.gentoo.org/glsa/202212-01
13
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213604
14
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213605
15
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
16
reference_url https://security.netapp.com/advisory/ntap-20230110-0006/
reference_id ntap-20230110-0006
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230110-0006/
17
reference_url https://security.netapp.com/advisory/ntap-20230208-0002/
reference_id ntap-20230208-0002
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230208-0002/
18
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
19
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
20
reference_url https://access.redhat.com/errata/RHSA-2023:0333
reference_id RHSA-2023:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0333
21
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
22
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
23
reference_url https://usn.ubuntu.com/5702-2/
reference_id USN-5702-2
reference_type
scores
url https://usn.ubuntu.com/5702-2/
24
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.86.0
purl pkg:generic/curl.se/curl@7.86.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-arjz-67yz-wkg9
11
vulnerability VCID-bz4u-6rft-s3a8
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-etzn-uhck-h7b2
15
vulnerability VCID-gnx2-djyk-uyaf
16
vulnerability VCID-hrsy-694u-2fec
17
vulnerability VCID-m15r-v9sr-2bbn
18
vulnerability VCID-mkyr-w79c-qqfz
19
vulnerability VCID-ms2r-94ph-yyh3
20
vulnerability VCID-n57n-cymy-z7dr
21
vulnerability VCID-nvzd-v3bs-6qek
22
vulnerability VCID-pwn6-j8vf-rufk
23
vulnerability VCID-qdcn-2u3v-b3cv
24
vulnerability VCID-qpux-jh6k-8qhx
25
vulnerability VCID-s73y-y7v7-43cm
26
vulnerability VCID-syz5-5y6f-s7er
27
vulnerability VCID-t9p4-2x7v-yfaq
28
vulnerability VCID-tcqe-7skm-b3fz
29
vulnerability VCID-tha5-fv3w-sub6
30
vulnerability VCID-u4bx-xqb3-vuef
31
vulnerability VCID-vbbv-k1r7-kkas
32
vulnerability VCID-wgma-bycg-1qb1
33
vulnerability VCID-x57x-w8g8-7ybz
34
vulnerability VCID-xpss-yndr-mycj
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.86.0
aliases CVE-2022-32221
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs
18
url VCID-ae59-w7a1-7keg
vulnerability_id VCID-ae59-w7a1-7keg
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
reference_id
reference_type
scores
0
value 0.01178
scoring_system epss
scoring_elements 0.78736
published_at 2026-04-12T12:55:00Z
1
value 0.01178
scoring_system epss
scoring_elements 0.78727
published_at 2026-04-13T12:55:00Z
2
value 0.01318
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-16T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-01T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-02T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80064
published_at 2026-04-04T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80053
published_at 2026-04-07T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80081
published_at 2026-04-08T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-09T12:55:00Z
9
value 0.01348
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
4
reference_url https://curl.haxx.se/673d0cd8.patch
reference_id
reference_type
scores
url https://curl.haxx.se/673d0cd8.patch
5
reference_url https://curl.haxx.se/docs/adv_20171004.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20171004.html
6
reference_url https://curl.se/docs/CVE-2017-1000254.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000254.html
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
13
reference_url https://support.apple.com/HT208331
reference_id
reference_type
scores
url https://support.apple.com/HT208331
14
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
15
reference_url http://www.securityfocus.com/bid/101115
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101115
16
reference_url http://www.securitytracker.com/id/1039509
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039509
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
reference_id 1495541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
reference_id 877671
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
19
reference_url https://security.archlinux.org/ASA-201710-2
reference_id ASA-201710-2
reference_type
scores
url https://security.archlinux.org/ASA-201710-2
20
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
21
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
22
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
23
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
24
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
25
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
26
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
27
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
28
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
29
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
30
reference_url https://security.archlinux.org/AVG-422
reference_id AVG-422
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-422
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
reference_id CVE-2017-1000254
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
149
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
150
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
151
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.56.0
purl pkg:generic/curl.se/curl@7.56.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-6yb7-t8qs-cbch
11
vulnerability VCID-75nw-4e2d-zqgg
12
vulnerability VCID-79sv-kzb5-hbc4
13
vulnerability VCID-7srk-hshe-h3f4
14
vulnerability VCID-7vt9-pf5q-uqb6
15
vulnerability VCID-8zks-th64-33b8
16
vulnerability VCID-9ggp-5wfj-ufcq
17
vulnerability VCID-9nak-pscy-e7gs
18
vulnerability VCID-arjz-67yz-wkg9
19
vulnerability VCID-bb2f-7qrm-1kca
20
vulnerability VCID-bhvd-ntxz-dkg4
21
vulnerability VCID-bv57-gvfs-qfhj
22
vulnerability VCID-cbah-e86c-w3fj
23
vulnerability VCID-cbph-fu9d-gbah
24
vulnerability VCID-cp4n-p2z3-43b4
25
vulnerability VCID-dc3c-3wab-57gh
26
vulnerability VCID-ddgz-rczw-jqfw
27
vulnerability VCID-dgtq-eaav-jyhf
28
vulnerability VCID-dhrf-2sz5-3bhf
29
vulnerability VCID-drkp-q9r5-ukcm
30
vulnerability VCID-etzn-uhck-h7b2
31
vulnerability VCID-ggt7-eejg-xfb6
32
vulnerability VCID-gnx2-djyk-uyaf
33
vulnerability VCID-hrsy-694u-2fec
34
vulnerability VCID-hudt-78dw-tkf2
35
vulnerability VCID-j2qx-np45-4qdu
36
vulnerability VCID-jnfc-8f5d-pyh4
37
vulnerability VCID-ju6h-a1sz-f7e5
38
vulnerability VCID-krgt-drpz-y7cy
39
vulnerability VCID-mkyr-w79c-qqfz
40
vulnerability VCID-ms2r-94ph-yyh3
41
vulnerability VCID-n51k-39uk-auca
42
vulnerability VCID-ph5u-5j8n-4qah
43
vulnerability VCID-q229-ag6u-u3hv
44
vulnerability VCID-qbpd-star-6fgn
45
vulnerability VCID-qdcn-2u3v-b3cv
46
vulnerability VCID-qpfa-s6sd-8yct
47
vulnerability VCID-r7bh-7wur-xffs
48
vulnerability VCID-rmez-cwu2-2ya7
49
vulnerability VCID-s73y-y7v7-43cm
50
vulnerability VCID-sh5a-fmna-wffr
51
vulnerability VCID-syz5-5y6f-s7er
52
vulnerability VCID-t4gn-9fw8-gkc3
53
vulnerability VCID-tz47-j4ey-t7g6
54
vulnerability VCID-u4bx-xqb3-vuef
55
vulnerability VCID-v3qf-6wju-1bg8
56
vulnerability VCID-vr9x-yqsd-6fc8
57
vulnerability VCID-w8ks-xk66-r3fm
58
vulnerability VCID-wrh2-77dv-hbdz
59
vulnerability VCID-wwam-tcmv-kqhc
60
vulnerability VCID-x57x-w8g8-7ybz
61
vulnerability VCID-y32p-52ps-4ug4
62
vulnerability VCID-y4x5-n5m2-x7bq
63
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.56.0
aliases CVE-2017-1000254
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg
19
url VCID-arjz-67yz-wkg9
vulnerability_id VCID-arjz-67yz-wkg9
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40463
published_at 2026-04-16T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40439
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40465
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40389
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.4044
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40451
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40472
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40434
published_at 2026-04-12T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40415
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
2
reference_url https://curl.se/docs/CVE-2023-27533.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27533.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1891474
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://hackerone.com/reports/1891474
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
reference_id 2179062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
10
reference_url https://security.netapp.com/advisory/ntap-20230420-0011/
reference_id ntap-20230420-0011
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.netapp.com/advisory/ntap-20230420-0011/
11
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
12
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
13
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
14
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
15
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27533
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9
20
url VCID-b2ef-zj3u-rbhy
vulnerability_id VCID-b2ef-zj3u-rbhy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url http://curl.haxx.se/docs/adv_20160127A.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20160127A.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
9
reference_url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61452
published_at 2026-04-13T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61326
published_at 2026-04-01T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-02T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61447
published_at 2026-04-08T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61463
published_at 2026-04-09T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
12
reference_url https://curl.se/docs/CVE-2016-0755.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-0755.html
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
14
reference_url https://support.apple.com/HT207170
reference_id
reference_type
scores
url https://support.apple.com/HT207170
15
reference_url http://www.debian.org/security/2016/dsa-3455
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3455
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
17
reference_url http://www.securityfocus.com/bid/82307
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82307
18
reference_url http://www.securitytracker.com/id/1034882
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034882
19
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
20
reference_url http://www.ubuntu.com/usn/USN-2882-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2882-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
reference_id 1302263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
reference_id CVE-2016-0755
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
29
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
30
reference_url https://usn.ubuntu.com/2882-1/
reference_id USN-2882-1
reference_type
scores
url https://usn.ubuntu.com/2882-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.47.0
purl pkg:generic/curl.se/curl@7.47.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-7xxh-66ys-4bhw
20
vulnerability VCID-8zks-th64-33b8
21
vulnerability VCID-9ggp-5wfj-ufcq
22
vulnerability VCID-9nak-pscy-e7gs
23
vulnerability VCID-a3v7-ptf1-6qgd
24
vulnerability VCID-a9b6-m25r-kygw
25
vulnerability VCID-ae59-w7a1-7keg
26
vulnerability VCID-arjz-67yz-wkg9
27
vulnerability VCID-bb2f-7qrm-1kca
28
vulnerability VCID-bgtv-jrna-9yb3
29
vulnerability VCID-bhvd-ntxz-dkg4
30
vulnerability VCID-bv57-gvfs-qfhj
31
vulnerability VCID-c6dk-7gj6-7far
32
vulnerability VCID-cbah-e86c-w3fj
33
vulnerability VCID-cbph-fu9d-gbah
34
vulnerability VCID-cp4n-p2z3-43b4
35
vulnerability VCID-dc3c-3wab-57gh
36
vulnerability VCID-ddgz-rczw-jqfw
37
vulnerability VCID-dgtq-eaav-jyhf
38
vulnerability VCID-e58m-g37d-9fd6
39
vulnerability VCID-eap9-v2gp-fqgh
40
vulnerability VCID-etzn-uhck-h7b2
41
vulnerability VCID-fnj3-2du1-4bhx
42
vulnerability VCID-fp65-97n1-xuaj
43
vulnerability VCID-ggt7-eejg-xfb6
44
vulnerability VCID-gnx2-djyk-uyaf
45
vulnerability VCID-hj8v-tgnn-mfdw
46
vulnerability VCID-hrsy-694u-2fec
47
vulnerability VCID-hudt-78dw-tkf2
48
vulnerability VCID-j2cq-q3r9-jfcp
49
vulnerability VCID-j2qx-np45-4qdu
50
vulnerability VCID-jeqg-g3en-5udw
51
vulnerability VCID-jqqf-gmd3-ubcd
52
vulnerability VCID-jtw4-af4y-nkbk
53
vulnerability VCID-ju6h-a1sz-f7e5
54
vulnerability VCID-k8kj-q1je-f7bt
55
vulnerability VCID-mkyr-w79c-qqfz
56
vulnerability VCID-ms2r-94ph-yyh3
57
vulnerability VCID-n51k-39uk-auca
58
vulnerability VCID-ph5u-5j8n-4qah
59
vulnerability VCID-q229-ag6u-u3hv
60
vulnerability VCID-qbpd-star-6fgn
61
vulnerability VCID-qdcn-2u3v-b3cv
62
vulnerability VCID-qpfa-s6sd-8yct
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-syz5-5y6f-s7er
68
vulnerability VCID-t4gn-9fw8-gkc3
69
vulnerability VCID-tz47-j4ey-t7g6
70
vulnerability VCID-u4bx-xqb3-vuef
71
vulnerability VCID-v3qf-6wju-1bg8
72
vulnerability VCID-vxpj-xygq-9be2
73
vulnerability VCID-vyk2-s5ut-ubbz
74
vulnerability VCID-w8ks-xk66-r3fm
75
vulnerability VCID-wc8j-qyp4-tqbd
76
vulnerability VCID-wrh2-77dv-hbdz
77
vulnerability VCID-wwam-tcmv-kqhc
78
vulnerability VCID-x57x-w8g8-7ybz
79
vulnerability VCID-y32p-52ps-4ug4
80
vulnerability VCID-y4x5-n5m2-x7bq
81
vulnerability VCID-yvdd-ataf-ckf1
82
vulnerability VCID-yxks-8529-23bj
83
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0
aliases CVE-2016-0755
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy
21
url VCID-c2na-7q9e-47am
vulnerability_id VCID-c2na-7q9e-47am
summary information disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0015
reference_id
reference_type
scores
0
value 0.01396
scoring_system epss
scoring_elements 0.80422
published_at 2026-04-16T12:55:00Z
1
value 0.01396
scoring_system epss
scoring_elements 0.80393
published_at 2026-04-13T12:55:00Z
2
value 0.01396
scoring_system epss
scoring_elements 0.80342
published_at 2026-04-01T12:55:00Z
3
value 0.01396
scoring_system epss
scoring_elements 0.80348
published_at 2026-04-02T12:55:00Z
4
value 0.01396
scoring_system epss
scoring_elements 0.80368
published_at 2026-04-04T12:55:00Z
5
value 0.01396
scoring_system epss
scoring_elements 0.80357
published_at 2026-04-07T12:55:00Z
6
value 0.01396
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-08T12:55:00Z
7
value 0.01396
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-09T12:55:00Z
8
value 0.01396
scoring_system epss
scoring_elements 0.80415
published_at 2026-04-11T12:55:00Z
9
value 0.01396
scoring_system epss
scoring_elements 0.804
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0015
2
reference_url https://curl.se/docs/CVE-2014-0015.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0015.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1053903
reference_id 1053903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1053903
6
reference_url https://access.redhat.com/errata/RHSA-2014:0561
reference_id RHSA-2014:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0561
7
reference_url https://usn.ubuntu.com/2097-1/
reference_id USN-2097-1
reference_type
scores
url https://usn.ubuntu.com/2097-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.35.0
purl pkg:generic/curl.se/curl@7.35.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-4mk9-5buz-puh5
10
vulnerability VCID-56wg-yafz-gkgx
11
vulnerability VCID-5jan-pqf6-fyhr
12
vulnerability VCID-5n7a-9j23-e7dj
13
vulnerability VCID-6muy-xpdq-9kg8
14
vulnerability VCID-6we4-n888-6qhe
15
vulnerability VCID-6yb7-t8qs-cbch
16
vulnerability VCID-75nw-4e2d-zqgg
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bv57-gvfs-qfhj
32
vulnerability VCID-c6dk-7gj6-7far
33
vulnerability VCID-cbah-e86c-w3fj
34
vulnerability VCID-cbph-fu9d-gbah
35
vulnerability VCID-cp4n-p2z3-43b4
36
vulnerability VCID-dc3c-3wab-57gh
37
vulnerability VCID-ddgz-rczw-jqfw
38
vulnerability VCID-dgtq-eaav-jyhf
39
vulnerability VCID-dzzd-afgu-3fcy
40
vulnerability VCID-e58m-g37d-9fd6
41
vulnerability VCID-eap9-v2gp-fqgh
42
vulnerability VCID-eer3-29q8-sbgq
43
vulnerability VCID-ekav-zg3k-v3ea
44
vulnerability VCID-etzn-uhck-h7b2
45
vulnerability VCID-fnj3-2du1-4bhx
46
vulnerability VCID-fp65-97n1-xuaj
47
vulnerability VCID-ggt7-eejg-xfb6
48
vulnerability VCID-gnx2-djyk-uyaf
49
vulnerability VCID-hj8v-tgnn-mfdw
50
vulnerability VCID-hudt-78dw-tkf2
51
vulnerability VCID-j2cq-q3r9-jfcp
52
vulnerability VCID-j2qx-np45-4qdu
53
vulnerability VCID-jeqg-g3en-5udw
54
vulnerability VCID-jqqf-gmd3-ubcd
55
vulnerability VCID-jtw4-af4y-nkbk
56
vulnerability VCID-ju6h-a1sz-f7e5
57
vulnerability VCID-k8kj-q1je-f7bt
58
vulnerability VCID-ma8s-he6x-z7a8
59
vulnerability VCID-mkyr-w79c-qqfz
60
vulnerability VCID-ms2r-94ph-yyh3
61
vulnerability VCID-ph5u-5j8n-4qah
62
vulnerability VCID-q229-ag6u-u3hv
63
vulnerability VCID-qbpd-star-6fgn
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-sknq-8mm1-6qfe
69
vulnerability VCID-snaz-pg1h-8kew
70
vulnerability VCID-syz5-5y6f-s7er
71
vulnerability VCID-t4gn-9fw8-gkc3
72
vulnerability VCID-t753-w1ha-kqaz
73
vulnerability VCID-tmv3-fzje-sbck
74
vulnerability VCID-tz47-j4ey-t7g6
75
vulnerability VCID-vxpj-xygq-9be2
76
vulnerability VCID-vyk2-s5ut-ubbz
77
vulnerability VCID-w8ks-xk66-r3fm
78
vulnerability VCID-wc8j-qyp4-tqbd
79
vulnerability VCID-wh98-pw9h-cyfx
80
vulnerability VCID-wrh2-77dv-hbdz
81
vulnerability VCID-wwam-tcmv-kqhc
82
vulnerability VCID-x57x-w8g8-7ybz
83
vulnerability VCID-xspf-45t1-2uhf
84
vulnerability VCID-y32p-52ps-4ug4
85
vulnerability VCID-y4x5-n5m2-x7bq
86
vulnerability VCID-ya9y-nav3-37hh
87
vulnerability VCID-yvdd-ataf-ckf1
88
vulnerability VCID-yxks-8529-23bj
89
vulnerability VCID-z8h3-fdj8-xuaa
90
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.35.0
aliases CVE-2014-0015
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am
22
url VCID-c6dk-7gj6-7far
vulnerability_id VCID-c6dk-7gj6-7far
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74617
published_at 2026-04-01T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74699
published_at 2026-04-16T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74621
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74647
published_at 2026-04-04T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-08T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74667
published_at 2026-04-09T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.7469
published_at 2026-04-11T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-12T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74662
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
2
reference_url https://curl.se/docs/CVE-2016-8623.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8623.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
reference_id 1388388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far
23
url VCID-cbah-e86c-w3fj
vulnerability_id VCID-cbah-e86c-w3fj
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20226
published_at 2026-04-16T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20386
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20446
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20251
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20311
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20341
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20295
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
2
reference_url https://curl.se/docs/CVE-2023-27535.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27535.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1892780
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://hackerone.com/reports/1892780
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
reference_id 2179073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
reference_id CVE-2023-27535
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2650
reference_id RHSA-2023:2650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2650
14
reference_url https://access.redhat.com/errata/RHSA-2023:3106
reference_id RHSA-2023:3106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3106
15
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
16
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
17
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27535
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj
24
url VCID-ddgz-rczw-jqfw
vulnerability_id VCID-ddgz-rczw-jqfw
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67581
published_at 2026-04-16T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67504
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67526
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67556
published_at 2026-04-08T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.6757
published_at 2026-04-09T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67579
published_at 2026-04-12T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67546
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
2
reference_url https://curl.se/docs/CVE-2023-28320.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28320.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1929597
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://hackerone.com/reports/1929597
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
reference_id 2196783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.gentoo.org/glsa/202310-12
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28320
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw
25
url VCID-dgtq-eaav-jyhf
vulnerability_id VCID-dgtq-eaav-jyhf
summary
Out-of-bounds Write
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3157
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3157
2
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3558
3
reference_url https://access.redhat.com/errata/RHSA-2019:1543
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1543
4
reference_url https://access.redhat.com/errata/RHSA-2020:0544
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0544
5
reference_url https://access.redhat.com/errata/RHSA-2020:0594
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0594
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
reference_id
reference_type
scores
0
value 0.0154
scoring_system epss
scoring_elements 0.81402
published_at 2026-04-16T12:55:00Z
1
value 0.0154
scoring_system epss
scoring_elements 0.81302
published_at 2026-04-01T12:55:00Z
2
value 0.0154
scoring_system epss
scoring_elements 0.81312
published_at 2026-04-02T12:55:00Z
3
value 0.0154
scoring_system epss
scoring_elements 0.81334
published_at 2026-04-04T12:55:00Z
4
value 0.0154
scoring_system epss
scoring_elements 0.81332
published_at 2026-04-07T12:55:00Z
5
value 0.0154
scoring_system epss
scoring_elements 0.81361
published_at 2026-04-08T12:55:00Z
6
value 0.0154
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-09T12:55:00Z
7
value 0.0154
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-11T12:55:00Z
8
value 0.0154
scoring_system epss
scoring_elements 0.81372
published_at 2026-04-12T12:55:00Z
9
value 0.0154
scoring_system epss
scoring_elements 0.81365
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
8
reference_url https://curl.haxx.se/docs/adv_2018-9cd6.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.haxx.se/docs/adv_2018-9cd6.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/coapp-packages/curl
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/coapp-packages/curl
14
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
15
reference_url https://usn.ubuntu.com/3598-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-1
16
reference_url https://usn.ubuntu.com/3598-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-1/
17
reference_url https://usn.ubuntu.com/3598-2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-2
18
reference_url https://usn.ubuntu.com/3598-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-2/
19
reference_url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
20
reference_url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
21
reference_url https://www.debian.org/security/2018/dsa-4136
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2018/dsa-4136
22
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
23
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
24
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
25
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
26
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
reference_id 1552628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
29
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
30
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
31
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
32
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
33
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
34
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
35
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
36
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
37
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
38
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
39
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
40
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
reference_id CVE-2018-1000120
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
42
reference_url https://curl.se/docs/CVE-2018-1000120.html
reference_id CVE-2018-1000120.HTML
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value High
scoring_system cvssv3.1
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.se/docs/CVE-2018-1000120.html
43
reference_url https://github.com/advisories/GHSA-674j-7m97-j2p9
reference_id GHSA-674j-7m97-j2p9
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-674j-7m97-j2p9
44
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
0
url pkg:generic/curl.se/curl@7.59.0
purl pkg:generic/curl.se/curl@7.59.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-75nw-4e2d-zqgg
11
vulnerability VCID-79sv-kzb5-hbc4
12
vulnerability VCID-7srk-hshe-h3f4
13
vulnerability VCID-7vt9-pf5q-uqb6
14
vulnerability VCID-8zks-th64-33b8
15
vulnerability VCID-9cbd-x468-rkaw
16
vulnerability VCID-9ggp-5wfj-ufcq
17
vulnerability VCID-9nak-pscy-e7gs
18
vulnerability VCID-arjz-67yz-wkg9
19
vulnerability VCID-bb2f-7qrm-1kca
20
vulnerability VCID-cbah-e86c-w3fj
21
vulnerability VCID-cp4n-p2z3-43b4
22
vulnerability VCID-dc3c-3wab-57gh
23
vulnerability VCID-ddgz-rczw-jqfw
24
vulnerability VCID-dhrf-2sz5-3bhf
25
vulnerability VCID-etzn-uhck-h7b2
26
vulnerability VCID-ggt7-eejg-xfb6
27
vulnerability VCID-gnx2-djyk-uyaf
28
vulnerability VCID-hrsy-694u-2fec
29
vulnerability VCID-hudt-78dw-tkf2
30
vulnerability VCID-ju6h-a1sz-f7e5
31
vulnerability VCID-krgt-drpz-y7cy
32
vulnerability VCID-mkyr-w79c-qqfz
33
vulnerability VCID-ms2r-94ph-yyh3
34
vulnerability VCID-n51k-39uk-auca
35
vulnerability VCID-n57n-cymy-z7dr
36
vulnerability VCID-nvzd-v3bs-6qek
37
vulnerability VCID-ph5u-5j8n-4qah
38
vulnerability VCID-q229-ag6u-u3hv
39
vulnerability VCID-qbpd-star-6fgn
40
vulnerability VCID-qdcn-2u3v-b3cv
41
vulnerability VCID-qpfa-s6sd-8yct
42
vulnerability VCID-r7bh-7wur-xffs
43
vulnerability VCID-rmez-cwu2-2ya7
44
vulnerability VCID-s73y-y7v7-43cm
45
vulnerability VCID-sh5a-fmna-wffr
46
vulnerability VCID-syz5-5y6f-s7er
47
vulnerability VCID-t4gn-9fw8-gkc3
48
vulnerability VCID-tz47-j4ey-t7g6
49
vulnerability VCID-u4bx-xqb3-vuef
50
vulnerability VCID-v3qf-6wju-1bg8
51
vulnerability VCID-vbbv-k1r7-kkas
52
vulnerability VCID-vr9x-yqsd-6fc8
53
vulnerability VCID-w8ks-xk66-r3fm
54
vulnerability VCID-wwam-tcmv-kqhc
55
vulnerability VCID-x57x-w8g8-7ybz
56
vulnerability VCID-xzay-sjpy-3yce
57
vulnerability VCID-y32p-52ps-4ug4
58
vulnerability VCID-y4x5-n5m2-x7bq
59
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.59.0
aliases CVE-2018-1000120, GHSA-674j-7m97-j2p9
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf
26
url VCID-dj5e-62rt-hkex
vulnerability_id VCID-dj5e-62rt-hkex
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which might allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0734
reference_id
reference_type
scores
0
value 0.04759
scoring_system epss
scoring_elements 0.89464
published_at 2026-04-16T12:55:00Z
1
value 0.04759
scoring_system epss
scoring_elements 0.8941
published_at 2026-04-01T12:55:00Z
2
value 0.04759
scoring_system epss
scoring_elements 0.89415
published_at 2026-04-02T12:55:00Z
3
value 0.04759
scoring_system epss
scoring_elements 0.89425
published_at 2026-04-04T12:55:00Z
4
value 0.04759
scoring_system epss
scoring_elements 0.89427
published_at 2026-04-07T12:55:00Z
5
value 0.04759
scoring_system epss
scoring_elements 0.89443
published_at 2026-04-08T12:55:00Z
6
value 0.04759
scoring_system epss
scoring_elements 0.89446
published_at 2026-04-09T12:55:00Z
7
value 0.04759
scoring_system epss
scoring_elements 0.89455
published_at 2026-04-11T12:55:00Z
8
value 0.04759
scoring_system epss
scoring_elements 0.89453
published_at 2026-04-12T12:55:00Z
9
value 0.04759
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0734
2
reference_url https://curl.se/docs/CVE-2010-0734.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2010-0734.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=563220
reference_id 563220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=563220
5
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
6
reference_url https://access.redhat.com/errata/RHSA-2010:0273
reference_id RHSA-2010:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0273
7
reference_url https://access.redhat.com/errata/RHSA-2010:0329
reference_id RHSA-2010:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0329
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.20.0
purl pkg:generic/curl.se/curl@7.20.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mcy-vzmg-mbhz
9
vulnerability VCID-4mk9-5buz-puh5
10
vulnerability VCID-6muy-xpdq-9kg8
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-7c8e-eaqy-akeu
14
vulnerability VCID-7srk-hshe-h3f4
15
vulnerability VCID-7vt9-pf5q-uqb6
16
vulnerability VCID-7xxh-66ys-4bhw
17
vulnerability VCID-87qu-j64w-p7fj
18
vulnerability VCID-8zks-th64-33b8
19
vulnerability VCID-9ggp-5wfj-ufcq
20
vulnerability VCID-9nak-pscy-e7gs
21
vulnerability VCID-a3v7-ptf1-6qgd
22
vulnerability VCID-ae59-w7a1-7keg
23
vulnerability VCID-arjz-67yz-wkg9
24
vulnerability VCID-b2ef-zj3u-rbhy
25
vulnerability VCID-c2na-7q9e-47am
26
vulnerability VCID-c6dk-7gj6-7far
27
vulnerability VCID-cbah-e86c-w3fj
28
vulnerability VCID-cbph-fu9d-gbah
29
vulnerability VCID-cp4n-p2z3-43b4
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-dzzd-afgu-3fcy
33
vulnerability VCID-e1yx-dxa6-1bba
34
vulnerability VCID-e58m-g37d-9fd6
35
vulnerability VCID-eer3-29q8-sbgq
36
vulnerability VCID-exhe-cmqf-duad
37
vulnerability VCID-fnj3-2du1-4bhx
38
vulnerability VCID-fp65-97n1-xuaj
39
vulnerability VCID-ggt7-eejg-xfb6
40
vulnerability VCID-gnx2-djyk-uyaf
41
vulnerability VCID-hudt-78dw-tkf2
42
vulnerability VCID-j2qx-np45-4qdu
43
vulnerability VCID-jeqg-g3en-5udw
44
vulnerability VCID-jqqf-gmd3-ubcd
45
vulnerability VCID-jtw4-af4y-nkbk
46
vulnerability VCID-k8kj-q1je-f7bt
47
vulnerability VCID-m3nh-aha9-dfbc
48
vulnerability VCID-mkyr-w79c-qqfz
49
vulnerability VCID-ph5u-5j8n-4qah
50
vulnerability VCID-prff-34kh-kbat
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-sknq-8mm1-6qfe
56
vulnerability VCID-snaz-pg1h-8kew
57
vulnerability VCID-syz5-5y6f-s7er
58
vulnerability VCID-t4gn-9fw8-gkc3
59
vulnerability VCID-tmv3-fzje-sbck
60
vulnerability VCID-tz47-j4ey-t7g6
61
vulnerability VCID-vxpj-xygq-9be2
62
vulnerability VCID-vyk2-s5ut-ubbz
63
vulnerability VCID-wc8j-qyp4-tqbd
64
vulnerability VCID-wwam-tcmv-kqhc
65
vulnerability VCID-xspf-45t1-2uhf
66
vulnerability VCID-y32p-52ps-4ug4
67
vulnerability VCID-y4x5-n5m2-x7bq
68
vulnerability VCID-yxks-8529-23bj
69
vulnerability VCID-z49y-v1gh-h7gj
70
vulnerability VCID-z8h3-fdj8-xuaa
71
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.20.0
aliases CVE-2010-0734
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex
27
url VCID-dzzd-afgu-3fcy
vulnerability_id VCID-dzzd-afgu-3fcy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
reference_id
reference_type
scores
0
value 0.0123
scoring_system epss
scoring_elements 0.79187
published_at 2026-04-16T12:55:00Z
1
value 0.0123
scoring_system epss
scoring_elements 0.79112
published_at 2026-04-01T12:55:00Z
2
value 0.0123
scoring_system epss
scoring_elements 0.79119
published_at 2026-04-02T12:55:00Z
3
value 0.0123
scoring_system epss
scoring_elements 0.79144
published_at 2026-04-04T12:55:00Z
4
value 0.0123
scoring_system epss
scoring_elements 0.79129
published_at 2026-04-07T12:55:00Z
5
value 0.0123
scoring_system epss
scoring_elements 0.79153
published_at 2026-04-08T12:55:00Z
6
value 0.0123
scoring_system epss
scoring_elements 0.79161
published_at 2026-04-13T12:55:00Z
7
value 0.0123
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-11T12:55:00Z
8
value 0.0123
scoring_system epss
scoring_elements 0.7917
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
2
reference_url https://curl.se/docs/CVE-2014-8150.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-8150.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
reference_id 1178692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
5
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
6
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
7
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
8
reference_url https://usn.ubuntu.com/2474-1/
reference_id USN-2474-1
reference_type
scores
url https://usn.ubuntu.com/2474-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.40.0
purl pkg:generic/curl.se/curl@7.40.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-e58m-g37d-9fd6
41
vulnerability VCID-eap9-v2gp-fqgh
42
vulnerability VCID-etzn-uhck-h7b2
43
vulnerability VCID-fnj3-2du1-4bhx
44
vulnerability VCID-fp65-97n1-xuaj
45
vulnerability VCID-ggt7-eejg-xfb6
46
vulnerability VCID-gnx2-djyk-uyaf
47
vulnerability VCID-hj8v-tgnn-mfdw
48
vulnerability VCID-hudt-78dw-tkf2
49
vulnerability VCID-j2cq-q3r9-jfcp
50
vulnerability VCID-j2qx-np45-4qdu
51
vulnerability VCID-jeqg-g3en-5udw
52
vulnerability VCID-jqqf-gmd3-ubcd
53
vulnerability VCID-jtw4-af4y-nkbk
54
vulnerability VCID-ju6h-a1sz-f7e5
55
vulnerability VCID-k8kj-q1je-f7bt
56
vulnerability VCID-mkyr-w79c-qqfz
57
vulnerability VCID-ms2r-94ph-yyh3
58
vulnerability VCID-ph5u-5j8n-4qah
59
vulnerability VCID-q229-ag6u-u3hv
60
vulnerability VCID-qbpd-star-6fgn
61
vulnerability VCID-qka4-jfdb-w3d5
62
vulnerability VCID-r447-deb8-2ydj
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-snaz-pg1h-8kew
68
vulnerability VCID-syz5-5y6f-s7er
69
vulnerability VCID-t4gn-9fw8-gkc3
70
vulnerability VCID-tmv3-fzje-sbck
71
vulnerability VCID-tz47-j4ey-t7g6
72
vulnerability VCID-v3qf-6wju-1bg8
73
vulnerability VCID-vxpj-xygq-9be2
74
vulnerability VCID-vyk2-s5ut-ubbz
75
vulnerability VCID-w8ks-xk66-r3fm
76
vulnerability VCID-wc8j-qyp4-tqbd
77
vulnerability VCID-wh98-pw9h-cyfx
78
vulnerability VCID-wrh2-77dv-hbdz
79
vulnerability VCID-wwam-tcmv-kqhc
80
vulnerability VCID-x57x-w8g8-7ybz
81
vulnerability VCID-xspf-45t1-2uhf
82
vulnerability VCID-y32p-52ps-4ug4
83
vulnerability VCID-y4x5-n5m2-x7bq
84
vulnerability VCID-yubp-g4rt-c3e6
85
vulnerability VCID-yvdd-ataf-ckf1
86
vulnerability VCID-yxks-8529-23bj
87
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.40.0
aliases CVE-2014-8150
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy
28
url VCID-e1yx-dxa6-1bba
vulnerability_id VCID-e1yx-dxa6-1bba
summary
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
    allowing attackers to cause unspecified impact.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
reference_id
reference_type
scores
0
value 0.03832
scoring_system epss
scoring_elements 0.88174
published_at 2026-04-16T12:55:00Z
1
value 0.03832
scoring_system epss
scoring_elements 0.8816
published_at 2026-04-13T12:55:00Z
2
value 0.03832
scoring_system epss
scoring_elements 0.88099
published_at 2026-04-01T12:55:00Z
3
value 0.03832
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-02T12:55:00Z
4
value 0.03832
scoring_system epss
scoring_elements 0.88124
published_at 2026-04-04T12:55:00Z
5
value 0.03832
scoring_system epss
scoring_elements 0.88131
published_at 2026-04-07T12:55:00Z
6
value 0.03832
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-08T12:55:00Z
7
value 0.03832
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-09T12:55:00Z
8
value 0.03832
scoring_system epss
scoring_elements 0.88165
published_at 2026-04-11T12:55:00Z
9
value 0.03832
scoring_system epss
scoring_elements 0.88159
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
2
reference_url https://curl.se/docs/CVE-2011-3389.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2011-3389.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737506
reference_id 737506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737506
6
reference_url https://security.gentoo.org/glsa/201111-02
reference_id GLSA-201111-02
reference_type
scores
url https://security.gentoo.org/glsa/201111-02
7
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
8
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
9
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
10
reference_url https://access.redhat.com/errata/RHSA-2011:1380
reference_id RHSA-2011:1380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1380
11
reference_url https://access.redhat.com/errata/RHSA-2011:1384
reference_id RHSA-2011:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1384
12
reference_url https://access.redhat.com/errata/RHSA-2012:0006
reference_id RHSA-2012:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0006
13
reference_url https://access.redhat.com/errata/RHSA-2012:0034
reference_id RHSA-2012:0034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0034
14
reference_url https://access.redhat.com/errata/RHSA-2012:0343
reference_id RHSA-2012:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0343
15
reference_url https://access.redhat.com/errata/RHSA-2012:0508
reference_id RHSA-2012:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0508
16
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
17
reference_url https://usn.ubuntu.com/1263-1/
reference_id USN-1263-1
reference_type
scores
url https://usn.ubuntu.com/1263-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.24.0
purl pkg:generic/curl.se/curl@7.24.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mk9-5buz-puh5
9
vulnerability VCID-5jan-pqf6-fyhr
10
vulnerability VCID-6muy-xpdq-9kg8
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-7c8e-eaqy-akeu
14
vulnerability VCID-7srk-hshe-h3f4
15
vulnerability VCID-7vt9-pf5q-uqb6
16
vulnerability VCID-7xxh-66ys-4bhw
17
vulnerability VCID-87qu-j64w-p7fj
18
vulnerability VCID-8zks-th64-33b8
19
vulnerability VCID-9ggp-5wfj-ufcq
20
vulnerability VCID-9nak-pscy-e7gs
21
vulnerability VCID-a3v7-ptf1-6qgd
22
vulnerability VCID-ae59-w7a1-7keg
23
vulnerability VCID-arjz-67yz-wkg9
24
vulnerability VCID-b2ef-zj3u-rbhy
25
vulnerability VCID-bdrx-sm6b-sken
26
vulnerability VCID-bv57-gvfs-qfhj
27
vulnerability VCID-c2na-7q9e-47am
28
vulnerability VCID-c6dk-7gj6-7far
29
vulnerability VCID-cbah-e86c-w3fj
30
vulnerability VCID-cbph-fu9d-gbah
31
vulnerability VCID-cp4n-p2z3-43b4
32
vulnerability VCID-ddgz-rczw-jqfw
33
vulnerability VCID-dgtq-eaav-jyhf
34
vulnerability VCID-dzzd-afgu-3fcy
35
vulnerability VCID-e58m-g37d-9fd6
36
vulnerability VCID-eap9-v2gp-fqgh
37
vulnerability VCID-eer3-29q8-sbgq
38
vulnerability VCID-fnj3-2du1-4bhx
39
vulnerability VCID-fp65-97n1-xuaj
40
vulnerability VCID-ggt7-eejg-xfb6
41
vulnerability VCID-gnx2-djyk-uyaf
42
vulnerability VCID-hudt-78dw-tkf2
43
vulnerability VCID-j2qx-np45-4qdu
44
vulnerability VCID-jeqg-g3en-5udw
45
vulnerability VCID-jqqf-gmd3-ubcd
46
vulnerability VCID-jtw4-af4y-nkbk
47
vulnerability VCID-ju6h-a1sz-f7e5
48
vulnerability VCID-k8kj-q1je-f7bt
49
vulnerability VCID-mkyr-w79c-qqfz
50
vulnerability VCID-ms2r-94ph-yyh3
51
vulnerability VCID-ph5u-5j8n-4qah
52
vulnerability VCID-prff-34kh-kbat
53
vulnerability VCID-r7bh-7wur-xffs
54
vulnerability VCID-rmez-cwu2-2ya7
55
vulnerability VCID-s73y-y7v7-43cm
56
vulnerability VCID-sh5a-fmna-wffr
57
vulnerability VCID-sknq-8mm1-6qfe
58
vulnerability VCID-snaz-pg1h-8kew
59
vulnerability VCID-syz5-5y6f-s7er
60
vulnerability VCID-t4gn-9fw8-gkc3
61
vulnerability VCID-tmv3-fzje-sbck
62
vulnerability VCID-tz47-j4ey-t7g6
63
vulnerability VCID-vxpj-xygq-9be2
64
vulnerability VCID-vyk2-s5ut-ubbz
65
vulnerability VCID-wc8j-qyp4-tqbd
66
vulnerability VCID-wrh2-77dv-hbdz
67
vulnerability VCID-wwam-tcmv-kqhc
68
vulnerability VCID-xspf-45t1-2uhf
69
vulnerability VCID-y32p-52ps-4ug4
70
vulnerability VCID-y4x5-n5m2-x7bq
71
vulnerability VCID-yxks-8529-23bj
72
vulnerability VCID-z49y-v1gh-h7gj
73
vulnerability VCID-z8h3-fdj8-xuaa
74
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.24.0
aliases CVE-2011-3389
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba
29
url VCID-e58m-g37d-9fd6
vulnerability_id VCID-e58m-g37d-9fd6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
reference_id
reference_type
scores
0
value 0.01346
scoring_system epss
scoring_elements 0.80023
published_at 2026-04-01T12:55:00Z
1
value 0.01346
scoring_system epss
scoring_elements 0.80102
published_at 2026-04-16T12:55:00Z
2
value 0.01346
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-02T12:55:00Z
3
value 0.01346
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-04T12:55:00Z
4
value 0.01346
scoring_system epss
scoring_elements 0.80042
published_at 2026-04-07T12:55:00Z
5
value 0.01346
scoring_system epss
scoring_elements 0.80069
published_at 2026-04-08T12:55:00Z
6
value 0.01346
scoring_system epss
scoring_elements 0.80078
published_at 2026-04-09T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-11T12:55:00Z
8
value 0.01346
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-12T12:55:00Z
9
value 0.01346
scoring_system epss
scoring_elements 0.80073
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
2
reference_url https://curl.se/docs/CVE-2016-8624.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8624.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
reference_id 1388390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8624
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6
30
url VCID-eer3-29q8-sbgq
vulnerability_id VCID-eer3-29q8-sbgq
summary security update
references
0
reference_url http://curl.haxx.se/docs/adv_20141105.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20141105.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
2
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1254.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1254.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3707
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43397
published_at 2026-04-16T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43274
published_at 2026-04-01T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43331
published_at 2026-04-02T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43359
published_at 2026-04-04T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43296
published_at 2026-04-07T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-08T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43363
published_at 2026-04-09T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43384
published_at 2026-04-11T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43352
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3707
7
reference_url https://curl.se/docs/CVE-2014-3707.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-3707.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2014/dsa-3069
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3069
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
12
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
13
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
14
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
15
reference_url http://www.securityfocus.com/bid/70988
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70988
16
reference_url http://www.ubuntu.com/usn/USN-2399-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2399-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154941
reference_id 1154941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154941
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3707
reference_id CVE-2014-3707
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3707
76
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
77
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
78
reference_url https://usn.ubuntu.com/2399-1/
reference_id USN-2399-1
reference_type
scores
url https://usn.ubuntu.com/2399-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.39.0
purl pkg:generic/curl.se/curl@7.39.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-dzzd-afgu-3fcy
41
vulnerability VCID-e58m-g37d-9fd6
42
vulnerability VCID-eap9-v2gp-fqgh
43
vulnerability VCID-etzn-uhck-h7b2
44
vulnerability VCID-fnj3-2du1-4bhx
45
vulnerability VCID-fp65-97n1-xuaj
46
vulnerability VCID-ggt7-eejg-xfb6
47
vulnerability VCID-gnx2-djyk-uyaf
48
vulnerability VCID-hj8v-tgnn-mfdw
49
vulnerability VCID-hudt-78dw-tkf2
50
vulnerability VCID-j2cq-q3r9-jfcp
51
vulnerability VCID-j2qx-np45-4qdu
52
vulnerability VCID-jeqg-g3en-5udw
53
vulnerability VCID-jqqf-gmd3-ubcd
54
vulnerability VCID-jtw4-af4y-nkbk
55
vulnerability VCID-ju6h-a1sz-f7e5
56
vulnerability VCID-k8kj-q1je-f7bt
57
vulnerability VCID-mkyr-w79c-qqfz
58
vulnerability VCID-ms2r-94ph-yyh3
59
vulnerability VCID-ph5u-5j8n-4qah
60
vulnerability VCID-q229-ag6u-u3hv
61
vulnerability VCID-qbpd-star-6fgn
62
vulnerability VCID-qka4-jfdb-w3d5
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-snaz-pg1h-8kew
68
vulnerability VCID-syz5-5y6f-s7er
69
vulnerability VCID-t4gn-9fw8-gkc3
70
vulnerability VCID-t753-w1ha-kqaz
71
vulnerability VCID-tmv3-fzje-sbck
72
vulnerability VCID-tz47-j4ey-t7g6
73
vulnerability VCID-v3qf-6wju-1bg8
74
vulnerability VCID-vxpj-xygq-9be2
75
vulnerability VCID-vyk2-s5ut-ubbz
76
vulnerability VCID-w8ks-xk66-r3fm
77
vulnerability VCID-wc8j-qyp4-tqbd
78
vulnerability VCID-wh98-pw9h-cyfx
79
vulnerability VCID-wrh2-77dv-hbdz
80
vulnerability VCID-wwam-tcmv-kqhc
81
vulnerability VCID-x57x-w8g8-7ybz
82
vulnerability VCID-xspf-45t1-2uhf
83
vulnerability VCID-y32p-52ps-4ug4
84
vulnerability VCID-y4x5-n5m2-x7bq
85
vulnerability VCID-yvdd-ataf-ckf1
86
vulnerability VCID-yxks-8529-23bj
87
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.39.0
aliases CVE-2014-3707
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq
31
url VCID-exhe-cmqf-duad
vulnerability_id VCID-exhe-cmqf-duad
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which might allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2192
reference_id
reference_type
scores
0
value 0.02049
scoring_system epss
scoring_elements 0.83894
published_at 2026-04-16T12:55:00Z
1
value 0.02049
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-01T12:55:00Z
2
value 0.02049
scoring_system epss
scoring_elements 0.83808
published_at 2026-04-02T12:55:00Z
3
value 0.02049
scoring_system epss
scoring_elements 0.83823
published_at 2026-04-04T12:55:00Z
4
value 0.02049
scoring_system epss
scoring_elements 0.83825
published_at 2026-04-07T12:55:00Z
5
value 0.02049
scoring_system epss
scoring_elements 0.83849
published_at 2026-04-08T12:55:00Z
6
value 0.02049
scoring_system epss
scoring_elements 0.83855
published_at 2026-04-09T12:55:00Z
7
value 0.02049
scoring_system epss
scoring_elements 0.83872
published_at 2026-04-11T12:55:00Z
8
value 0.02049
scoring_system epss
scoring_elements 0.83866
published_at 2026-04-12T12:55:00Z
9
value 0.02049
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2192
2
reference_url https://curl.se/docs/CVE-2011-2192.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2011-2192.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615
reference_id 631615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=711454
reference_id 711454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=711454
6
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
7
reference_url https://access.redhat.com/errata/RHSA-2011:0918
reference_id RHSA-2011:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0918
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.21.7
purl pkg:generic/curl.se/curl@7.21.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mcy-vzmg-mbhz
9
vulnerability VCID-4mk9-5buz-puh5
10
vulnerability VCID-6muy-xpdq-9kg8
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-7c8e-eaqy-akeu
14
vulnerability VCID-7srk-hshe-h3f4
15
vulnerability VCID-7vt9-pf5q-uqb6
16
vulnerability VCID-7xxh-66ys-4bhw
17
vulnerability VCID-87qu-j64w-p7fj
18
vulnerability VCID-8zks-th64-33b8
19
vulnerability VCID-9ggp-5wfj-ufcq
20
vulnerability VCID-9nak-pscy-e7gs
21
vulnerability VCID-a3v7-ptf1-6qgd
22
vulnerability VCID-ae59-w7a1-7keg
23
vulnerability VCID-arjz-67yz-wkg9
24
vulnerability VCID-b2ef-zj3u-rbhy
25
vulnerability VCID-bdrx-sm6b-sken
26
vulnerability VCID-bv57-gvfs-qfhj
27
vulnerability VCID-c2na-7q9e-47am
28
vulnerability VCID-c6dk-7gj6-7far
29
vulnerability VCID-cbah-e86c-w3fj
30
vulnerability VCID-cbph-fu9d-gbah
31
vulnerability VCID-cp4n-p2z3-43b4
32
vulnerability VCID-ddgz-rczw-jqfw
33
vulnerability VCID-dgtq-eaav-jyhf
34
vulnerability VCID-dzzd-afgu-3fcy
35
vulnerability VCID-e1yx-dxa6-1bba
36
vulnerability VCID-e58m-g37d-9fd6
37
vulnerability VCID-eap9-v2gp-fqgh
38
vulnerability VCID-eer3-29q8-sbgq
39
vulnerability VCID-fnj3-2du1-4bhx
40
vulnerability VCID-fp65-97n1-xuaj
41
vulnerability VCID-ggt7-eejg-xfb6
42
vulnerability VCID-gnx2-djyk-uyaf
43
vulnerability VCID-hudt-78dw-tkf2
44
vulnerability VCID-j2qx-np45-4qdu
45
vulnerability VCID-jeqg-g3en-5udw
46
vulnerability VCID-jqqf-gmd3-ubcd
47
vulnerability VCID-jtw4-af4y-nkbk
48
vulnerability VCID-ju6h-a1sz-f7e5
49
vulnerability VCID-k8kj-q1je-f7bt
50
vulnerability VCID-mkyr-w79c-qqfz
51
vulnerability VCID-ph5u-5j8n-4qah
52
vulnerability VCID-prff-34kh-kbat
53
vulnerability VCID-r7bh-7wur-xffs
54
vulnerability VCID-rmez-cwu2-2ya7
55
vulnerability VCID-s73y-y7v7-43cm
56
vulnerability VCID-sh5a-fmna-wffr
57
vulnerability VCID-sknq-8mm1-6qfe
58
vulnerability VCID-snaz-pg1h-8kew
59
vulnerability VCID-syz5-5y6f-s7er
60
vulnerability VCID-t4gn-9fw8-gkc3
61
vulnerability VCID-tmv3-fzje-sbck
62
vulnerability VCID-tz47-j4ey-t7g6
63
vulnerability VCID-vxpj-xygq-9be2
64
vulnerability VCID-vyk2-s5ut-ubbz
65
vulnerability VCID-wc8j-qyp4-tqbd
66
vulnerability VCID-wrh2-77dv-hbdz
67
vulnerability VCID-wwam-tcmv-kqhc
68
vulnerability VCID-xspf-45t1-2uhf
69
vulnerability VCID-y32p-52ps-4ug4
70
vulnerability VCID-y4x5-n5m2-x7bq
71
vulnerability VCID-yxks-8529-23bj
72
vulnerability VCID-z49y-v1gh-h7gj
73
vulnerability VCID-z8h3-fdj8-xuaa
74
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.21.7
aliases CVE-2011-2192
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad
32
url VCID-fnj3-2du1-4bhx
vulnerability_id VCID-fnj3-2du1-4bhx
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75492
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.7559
published_at 2026-04-16T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-02T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-04T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-07T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-13T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75557
published_at 2026-04-12T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
4
reference_url https://curl.haxx.se/docs/adv_20161221A.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20161221A.html
5
reference_url https://curl.se/docs/CVE-2016-9586.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9586.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
9
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
13
reference_url http://www.securityfocus.com/bid/95019
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95019
14
reference_url http://www.securitytracker.com/id/1037515
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037515
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
reference_id 1406712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
reference_id 848958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
17
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
18
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
19
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
20
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
21
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
22
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
23
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
24
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
25
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
26
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
27
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
28
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
reference_id CVE-2016-9586
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
33
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.52.0
purl pkg:generic/curl.se/curl@7.52.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-36n6-qanf-nue8
8
vulnerability VCID-3sy2-4f3g-zkac
9
vulnerability VCID-47qb-2qkw-1qej
10
vulnerability VCID-56wg-yafz-gkgx
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6we4-n888-6qhe
13
vulnerability VCID-6yb7-t8qs-cbch
14
vulnerability VCID-75nw-4e2d-zqgg
15
vulnerability VCID-79sv-kzb5-hbc4
16
vulnerability VCID-7srk-hshe-h3f4
17
vulnerability VCID-7vt9-pf5q-uqb6
18
vulnerability VCID-8zks-th64-33b8
19
vulnerability VCID-9ggp-5wfj-ufcq
20
vulnerability VCID-9nak-pscy-e7gs
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-dhrf-2sz5-3bhf
33
vulnerability VCID-etzn-uhck-h7b2
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hrsy-694u-2fec
38
vulnerability VCID-hudt-78dw-tkf2
39
vulnerability VCID-hyqp-z8hb-fqbt
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-q3hu-8uy5-e3a4
49
vulnerability VCID-qbpd-star-6fgn
50
vulnerability VCID-qdcn-2u3v-b3cv
51
vulnerability VCID-qpfa-s6sd-8yct
52
vulnerability VCID-r7bh-7wur-xffs
53
vulnerability VCID-rmez-cwu2-2ya7
54
vulnerability VCID-s73y-y7v7-43cm
55
vulnerability VCID-sh5a-fmna-wffr
56
vulnerability VCID-syz5-5y6f-s7er
57
vulnerability VCID-t4gn-9fw8-gkc3
58
vulnerability VCID-tz47-j4ey-t7g6
59
vulnerability VCID-u4bx-xqb3-vuef
60
vulnerability VCID-v3qf-6wju-1bg8
61
vulnerability VCID-w8ks-xk66-r3fm
62
vulnerability VCID-wrh2-77dv-hbdz
63
vulnerability VCID-wwam-tcmv-kqhc
64
vulnerability VCID-x57x-w8g8-7ybz
65
vulnerability VCID-y32p-52ps-4ug4
66
vulnerability VCID-y4x5-n5m2-x7bq
67
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.52.0
aliases CVE-2016-9586
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx
33
url VCID-fp65-97n1-xuaj
vulnerability_id VCID-fp65-97n1-xuaj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76442
published_at 2026-04-01T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.7654
published_at 2026-04-16T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76447
published_at 2026-04-02T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-04T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-07T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76489
published_at 2026-04-08T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-09T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76527
published_at 2026-04-11T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76506
published_at 2026-04-12T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.765
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
3
reference_url https://curl.haxx.se/docs/adv_20170809B.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809B.html
4
reference_url https://curl.se/docs/CVE-2017-1000100.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000100.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
10
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
11
reference_url http://www.securityfocus.com/bid/100286
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100286
12
reference_url http://www.securitytracker.com/id/1039118
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039118
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
reference_id 1478310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
reference_id 871555
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
15
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
16
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
17
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
18
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
19
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
20
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
21
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
22
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
23
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
24
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
25
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
26
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
reference_id CVE-2017-1000100
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
107
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
108
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
109
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.55.0
purl pkg:generic/curl.se/curl@7.55.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-6yb7-t8qs-cbch
11
vulnerability VCID-75nw-4e2d-zqgg
12
vulnerability VCID-79sv-kzb5-hbc4
13
vulnerability VCID-7srk-hshe-h3f4
14
vulnerability VCID-7vt9-pf5q-uqb6
15
vulnerability VCID-8zks-th64-33b8
16
vulnerability VCID-9ggp-5wfj-ufcq
17
vulnerability VCID-9nak-pscy-e7gs
18
vulnerability VCID-ae59-w7a1-7keg
19
vulnerability VCID-arjz-67yz-wkg9
20
vulnerability VCID-bb2f-7qrm-1kca
21
vulnerability VCID-bhvd-ntxz-dkg4
22
vulnerability VCID-bv57-gvfs-qfhj
23
vulnerability VCID-cbah-e86c-w3fj
24
vulnerability VCID-cbph-fu9d-gbah
25
vulnerability VCID-cp4n-p2z3-43b4
26
vulnerability VCID-dc3c-3wab-57gh
27
vulnerability VCID-ddgz-rczw-jqfw
28
vulnerability VCID-dgtq-eaav-jyhf
29
vulnerability VCID-dhrf-2sz5-3bhf
30
vulnerability VCID-etzn-uhck-h7b2
31
vulnerability VCID-ggt7-eejg-xfb6
32
vulnerability VCID-gnx2-djyk-uyaf
33
vulnerability VCID-hrsy-694u-2fec
34
vulnerability VCID-hudt-78dw-tkf2
35
vulnerability VCID-j2qx-np45-4qdu
36
vulnerability VCID-jnfc-8f5d-pyh4
37
vulnerability VCID-ju6h-a1sz-f7e5
38
vulnerability VCID-krgt-drpz-y7cy
39
vulnerability VCID-mkyr-w79c-qqfz
40
vulnerability VCID-ms2r-94ph-yyh3
41
vulnerability VCID-n51k-39uk-auca
42
vulnerability VCID-ph5u-5j8n-4qah
43
vulnerability VCID-q229-ag6u-u3hv
44
vulnerability VCID-qbpd-star-6fgn
45
vulnerability VCID-qdcn-2u3v-b3cv
46
vulnerability VCID-qpfa-s6sd-8yct
47
vulnerability VCID-r7bh-7wur-xffs
48
vulnerability VCID-rmez-cwu2-2ya7
49
vulnerability VCID-s73y-y7v7-43cm
50
vulnerability VCID-sh5a-fmna-wffr
51
vulnerability VCID-syz5-5y6f-s7er
52
vulnerability VCID-t4gn-9fw8-gkc3
53
vulnerability VCID-tz47-j4ey-t7g6
54
vulnerability VCID-u4bx-xqb3-vuef
55
vulnerability VCID-v3qf-6wju-1bg8
56
vulnerability VCID-vr9x-yqsd-6fc8
57
vulnerability VCID-w8ks-xk66-r3fm
58
vulnerability VCID-wrh2-77dv-hbdz
59
vulnerability VCID-wwam-tcmv-kqhc
60
vulnerability VCID-x57x-w8g8-7ybz
61
vulnerability VCID-y32p-52ps-4ug4
62
vulnerability VCID-y4x5-n5m2-x7bq
63
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.55.0
aliases CVE-2017-1000100
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj
34
url VCID-ggt7-eejg-xfb6
vulnerability_id VCID-ggt7-eejg-xfb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20928
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20845
published_at 2026-04-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-08T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21078
published_at 2026-04-02T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30169
published_at 2026-04-16T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30153
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
2
reference_url https://curl.se/docs/CVE-2021-22876.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://curl.se/docs/CVE-2021-22876.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1101882
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://hackerone.com/reports/1101882
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
reference_id 1941964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
reference_id 2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
reference_id 986269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
16
reference_url https://security.archlinux.org/AVG-1753
reference_id AVG-1753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1753
17
reference_url https://security.archlinux.org/AVG-1754
reference_id AVG-1754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1754
18
reference_url https://security.archlinux.org/AVG-1755
reference_id AVG-1755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1755
19
reference_url https://security.archlinux.org/AVG-1756
reference_id AVG-1756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1756
20
reference_url https://security.archlinux.org/AVG-1757
reference_id AVG-1757
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1757
21
reference_url https://security.archlinux.org/AVG-1758
reference_id AVG-1758
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1758
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
reference_id CVE-2021-22876
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
23
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.gentoo.org/glsa/202105-36
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
reference_id ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
reference_id KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
27
reference_url https://security.netapp.com/advisory/ntap-20210521-0007/
reference_id ntap-20210521-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.netapp.com/advisory/ntap-20210521-0007/
28
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
29
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
30
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/4898-1/
reference_id USN-4898-1
reference_type
scores
url https://usn.ubuntu.com/4898-1/
33
reference_url https://usn.ubuntu.com/4903-1/
reference_id USN-4903-1
reference_type
scores
url https://usn.ubuntu.com/4903-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.76.0
purl pkg:generic/curl.se/curl@7.76.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-38mv-usbe-z7hd
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-d3s1-3qs7-2uhw
18
vulnerability VCID-dc3c-3wab-57gh
19
vulnerability VCID-ddgz-rczw-jqfw
20
vulnerability VCID-etzn-uhck-h7b2
21
vulnerability VCID-gnx2-djyk-uyaf
22
vulnerability VCID-gv7x-j8bz-wycc
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-mkyr-w79c-qqfz
26
vulnerability VCID-ms2r-94ph-yyh3
27
vulnerability VCID-n57n-cymy-z7dr
28
vulnerability VCID-nvzd-v3bs-6qek
29
vulnerability VCID-ph5u-5j8n-4qah
30
vulnerability VCID-pwn6-j8vf-rufk
31
vulnerability VCID-q229-ag6u-u3hv
32
vulnerability VCID-qbpd-star-6fgn
33
vulnerability VCID-qdcn-2u3v-b3cv
34
vulnerability VCID-qpux-jh6k-8qhx
35
vulnerability VCID-r7bh-7wur-xffs
36
vulnerability VCID-s73y-y7v7-43cm
37
vulnerability VCID-sh5a-fmna-wffr
38
vulnerability VCID-syz5-5y6f-s7er
39
vulnerability VCID-t1fk-cbsx-j3gh
40
vulnerability VCID-t4gn-9fw8-gkc3
41
vulnerability VCID-t8t6-9wa3-aub7
42
vulnerability VCID-t9p4-2x7v-yfaq
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-wgma-bycg-1qb1
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xzay-sjpy-3yce
49
vulnerability VCID-y32p-52ps-4ug4
50
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.76.0
aliases CVE-2021-22876
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6
35
url VCID-gnx2-djyk-uyaf
vulnerability_id VCID-gnx2-djyk-uyaf
summary
Cookie injection with none file
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle does not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.49036
published_at 2026-04-16T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-02T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48991
published_at 2026-04-13T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48944
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48998
published_at 2026-04-08T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48995
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49012
published_at 2026-04-11T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2148242
reference_id
reference_type
scores
url https://hackerone.com/reports/2148242
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
reference_id 2241938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
7
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
8
reference_url http://seclists.org/fulldisclosure/2024/Jan/37
reference_id 37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/37
9
reference_url http://seclists.org/fulldisclosure/2024/Jan/38
reference_id 38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/38
10
reference_url https://security.archlinux.org/AVG-2845
reference_id AVG-2845
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2845
11
reference_url https://security.archlinux.org/AVG-2846
reference_id AVG-2846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2846
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
reference_id CVE-2023-38546
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
13
reference_url https://curl.se/docs/CVE-2023-38546.html
reference_id CVE-2023-38546.HTML
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://curl.se/docs/CVE-2023-38546.html
14
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
15
reference_url https://support.apple.com/kb/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214036
16
reference_url https://support.apple.com/kb/HT214057
reference_id HT214057
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214057
17
reference_url https://support.apple.com/kb/HT214058
reference_id HT214058
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214058
18
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214063
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
reference_id OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
20
reference_url https://access.redhat.com/errata/RHSA-2023:5700
reference_id RHSA-2023:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5700
21
reference_url https://access.redhat.com/errata/RHSA-2023:5763
reference_id RHSA-2023:5763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5763
22
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
23
reference_url https://access.redhat.com/errata/RHSA-2023:6745
reference_id RHSA-2023:6745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6745
24
reference_url https://access.redhat.com/errata/RHSA-2023:7540
reference_id RHSA-2023:7540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7540
25
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
26
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
27
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
28
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
29
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
30
reference_url https://access.redhat.com/errata/RHSA-2024:2101
reference_id RHSA-2024:2101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2101
31
reference_url https://usn.ubuntu.com/6429-1/
reference_id USN-6429-1
reference_type
scores
url https://usn.ubuntu.com/6429-1/
32
reference_url https://usn.ubuntu.com/6429-2/
reference_id USN-6429-2
reference_type
scores
url https://usn.ubuntu.com/6429-2/
33
reference_url https://usn.ubuntu.com/6429-3/
reference_id USN-6429-3
reference_type
scores
url https://usn.ubuntu.com/6429-3/
34
reference_url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
reference_id viewtopic.php?f=8&t=8868
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
fixed_packages
0
url pkg:generic/curl.se/curl@8.4.0
purl pkg:generic/curl.se/curl@8.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-etzn-uhck-h7b2
7
vulnerability VCID-hrsy-694u-2fec
8
vulnerability VCID-mkyr-w79c-qqfz
9
vulnerability VCID-nvzd-v3bs-6qek
10
vulnerability VCID-pwn6-j8vf-rufk
11
vulnerability VCID-qdcn-2u3v-b3cv
12
vulnerability VCID-qpux-jh6k-8qhx
13
vulnerability VCID-t9p4-2x7v-yfaq
14
vulnerability VCID-tha5-fv3w-sub6
15
vulnerability VCID-u4bx-xqb3-vuef
16
vulnerability VCID-vbbv-k1r7-kkas
17
vulnerability VCID-wgma-bycg-1qb1
18
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0
aliases CVE-2023-38546
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf
36
url VCID-hudt-78dw-tkf2
vulnerability_id VCID-hudt-78dw-tkf2
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5489
published_at 2026-04-01T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.55017
published_at 2026-04-11T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.55005
published_at 2026-04-09T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55006
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54956
published_at 2026-04-07T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.5496
published_at 2026-04-02T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-04T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62217
published_at 2026-04-16T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62194
published_at 2026-04-12T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
2
reference_url https://curl.se/docs/CVE-2021-22925.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22925.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1223882
reference_id
reference_type
scores
url https://hackerone.com/reports/1223882
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
reference_id 1970902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
6
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
7
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
8
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
9
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
10
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
11
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
12
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
13
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
14
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
15
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
16
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
17
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
18
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
19
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
20
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
21
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
22
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22925
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2
37
url VCID-jeqg-g3en-5udw
vulnerability_id VCID-jeqg-g3en-5udw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
reference_id
reference_type
scores
0
value 0.01086
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-01T12:55:00Z
1
value 0.01086
scoring_system epss
scoring_elements 0.77944
published_at 2026-04-16T12:55:00Z
2
value 0.01086
scoring_system epss
scoring_elements 0.77907
published_at 2026-04-12T12:55:00Z
3
value 0.01086
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-13T12:55:00Z
4
value 0.01086
scoring_system epss
scoring_elements 0.77854
published_at 2026-04-02T12:55:00Z
5
value 0.01086
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-04T12:55:00Z
6
value 0.01086
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-07T12:55:00Z
7
value 0.01086
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-08T12:55:00Z
8
value 0.01086
scoring_system epss
scoring_elements 0.77896
published_at 2026-04-09T12:55:00Z
9
value 0.01086
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
2
reference_url https://curl.se/docs/CVE-2016-5420.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5420.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
reference_id 1362190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.50.1
purl pkg:generic/curl.se/curl@7.50.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-8zks-th64-33b8
20
vulnerability VCID-9ggp-5wfj-ufcq
21
vulnerability VCID-9nak-pscy-e7gs
22
vulnerability VCID-a3v7-ptf1-6qgd
23
vulnerability VCID-a9b6-m25r-kygw
24
vulnerability VCID-ae59-w7a1-7keg
25
vulnerability VCID-arjz-67yz-wkg9
26
vulnerability VCID-bb2f-7qrm-1kca
27
vulnerability VCID-bhvd-ntxz-dkg4
28
vulnerability VCID-bv57-gvfs-qfhj
29
vulnerability VCID-c6dk-7gj6-7far
30
vulnerability VCID-cbah-e86c-w3fj
31
vulnerability VCID-cbph-fu9d-gbah
32
vulnerability VCID-cp4n-p2z3-43b4
33
vulnerability VCID-dc3c-3wab-57gh
34
vulnerability VCID-ddgz-rczw-jqfw
35
vulnerability VCID-dgtq-eaav-jyhf
36
vulnerability VCID-e58m-g37d-9fd6
37
vulnerability VCID-etzn-uhck-h7b2
38
vulnerability VCID-fnj3-2du1-4bhx
39
vulnerability VCID-fp65-97n1-xuaj
40
vulnerability VCID-ggt7-eejg-xfb6
41
vulnerability VCID-gnx2-djyk-uyaf
42
vulnerability VCID-hj8v-tgnn-mfdw
43
vulnerability VCID-hrsy-694u-2fec
44
vulnerability VCID-hudt-78dw-tkf2
45
vulnerability VCID-j2cq-q3r9-jfcp
46
vulnerability VCID-j2qx-np45-4qdu
47
vulnerability VCID-jnfc-8f5d-pyh4
48
vulnerability VCID-jqqf-gmd3-ubcd
49
vulnerability VCID-jtw4-af4y-nkbk
50
vulnerability VCID-ju6h-a1sz-f7e5
51
vulnerability VCID-k8kj-q1je-f7bt
52
vulnerability VCID-mkyr-w79c-qqfz
53
vulnerability VCID-ms2r-94ph-yyh3
54
vulnerability VCID-n51k-39uk-auca
55
vulnerability VCID-ph5u-5j8n-4qah
56
vulnerability VCID-q229-ag6u-u3hv
57
vulnerability VCID-qbpd-star-6fgn
58
vulnerability VCID-qdcn-2u3v-b3cv
59
vulnerability VCID-qpfa-s6sd-8yct
60
vulnerability VCID-r7bh-7wur-xffs
61
vulnerability VCID-rmez-cwu2-2ya7
62
vulnerability VCID-s73y-y7v7-43cm
63
vulnerability VCID-sh5a-fmna-wffr
64
vulnerability VCID-syz5-5y6f-s7er
65
vulnerability VCID-t4gn-9fw8-gkc3
66
vulnerability VCID-tz47-j4ey-t7g6
67
vulnerability VCID-u4bx-xqb3-vuef
68
vulnerability VCID-v3qf-6wju-1bg8
69
vulnerability VCID-vxpj-xygq-9be2
70
vulnerability VCID-vyk2-s5ut-ubbz
71
vulnerability VCID-w8ks-xk66-r3fm
72
vulnerability VCID-wrh2-77dv-hbdz
73
vulnerability VCID-wwam-tcmv-kqhc
74
vulnerability VCID-x57x-w8g8-7ybz
75
vulnerability VCID-y32p-52ps-4ug4
76
vulnerability VCID-y4x5-n5m2-x7bq
77
vulnerability VCID-yvdd-ataf-ckf1
78
vulnerability VCID-yxks-8529-23bj
79
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1
aliases CVE-2016-5420
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw
38
url VCID-jqqf-gmd3-ubcd
vulnerability_id VCID-jqqf-gmd3-ubcd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
reference_id
reference_type
scores
0
value 0.0226
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-01T12:55:00Z
1
value 0.0226
scoring_system epss
scoring_elements 0.84638
published_at 2026-04-16T12:55:00Z
2
value 0.0226
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-02T12:55:00Z
3
value 0.0226
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-04T12:55:00Z
4
value 0.0226
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-07T12:55:00Z
5
value 0.0226
scoring_system epss
scoring_elements 0.84601
published_at 2026-04-08T12:55:00Z
6
value 0.0226
scoring_system epss
scoring_elements 0.84608
published_at 2026-04-09T12:55:00Z
7
value 0.0226
scoring_system epss
scoring_elements 0.84627
published_at 2026-04-11T12:55:00Z
8
value 0.0226
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-12T12:55:00Z
9
value 0.0226
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
2
reference_url https://curl.se/docs/CVE-2016-8621.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8621.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
reference_id 1388385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8621
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd
39
url VCID-jtw4-af4y-nkbk
vulnerability_id VCID-jtw4-af4y-nkbk
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
reference_id
reference_type
scores
0
value 0.02935
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-01T12:55:00Z
1
value 0.02935
scoring_system epss
scoring_elements 0.86441
published_at 2026-04-16T12:55:00Z
2
value 0.02935
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-02T12:55:00Z
3
value 0.02935
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-04T12:55:00Z
4
value 0.02935
scoring_system epss
scoring_elements 0.86389
published_at 2026-04-07T12:55:00Z
5
value 0.02935
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-08T12:55:00Z
6
value 0.02935
scoring_system epss
scoring_elements 0.86418
published_at 2026-04-09T12:55:00Z
7
value 0.02935
scoring_system epss
scoring_elements 0.86432
published_at 2026-04-11T12:55:00Z
8
value 0.02935
scoring_system epss
scoring_elements 0.8643
published_at 2026-04-12T12:55:00Z
9
value 0.02935
scoring_system epss
scoring_elements 0.86425
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
2
reference_url https://curl.se/docs/CVE-2016-8619.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8619.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
reference_id 1388379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk
40
url VCID-k8kj-q1je-f7bt
vulnerability_id VCID-k8kj-q1je-f7bt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
reference_id
reference_type
scores
0
value 0.02289
scoring_system epss
scoring_elements 0.84631
published_at 2026-04-01T12:55:00Z
1
value 0.02289
scoring_system epss
scoring_elements 0.84726
published_at 2026-04-16T12:55:00Z
2
value 0.02289
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-09T12:55:00Z
3
value 0.02289
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-11T12:55:00Z
4
value 0.02289
scoring_system epss
scoring_elements 0.8471
published_at 2026-04-12T12:55:00Z
5
value 0.02289
scoring_system epss
scoring_elements 0.84704
published_at 2026-04-13T12:55:00Z
6
value 0.02289
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-02T12:55:00Z
7
value 0.02289
scoring_system epss
scoring_elements 0.84666
published_at 2026-04-04T12:55:00Z
8
value 0.02289
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-07T12:55:00Z
9
value 0.02289
scoring_system epss
scoring_elements 0.84689
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
2
reference_url https://curl.se/docs/CVE-2016-7167.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7167.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
reference_id 1375906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
reference_id 837945
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
7
reference_url https://security.archlinux.org/ASA-201609-18
reference_id ASA-201609-18
reference_type
scores
url https://security.archlinux.org/ASA-201609-18
8
reference_url https://security.archlinux.org/ASA-201609-19
reference_id ASA-201609-19
reference_type
scores
url https://security.archlinux.org/ASA-201609-19
9
reference_url https://security.archlinux.org/AVG-20
reference_id AVG-20
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-20
10
reference_url https://security.archlinux.org/AVG-21
reference_id AVG-21
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-21
11
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
12
reference_url https://access.redhat.com/errata/RHSA-2017:2016
reference_id RHSA-2017:2016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2016
13
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.50.3
purl pkg:generic/curl.se/curl@7.50.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-8zks-th64-33b8
20
vulnerability VCID-9ggp-5wfj-ufcq
21
vulnerability VCID-9nak-pscy-e7gs
22
vulnerability VCID-a9b6-m25r-kygw
23
vulnerability VCID-ae59-w7a1-7keg
24
vulnerability VCID-arjz-67yz-wkg9
25
vulnerability VCID-bb2f-7qrm-1kca
26
vulnerability VCID-bhvd-ntxz-dkg4
27
vulnerability VCID-bv57-gvfs-qfhj
28
vulnerability VCID-c6dk-7gj6-7far
29
vulnerability VCID-cbah-e86c-w3fj
30
vulnerability VCID-cbph-fu9d-gbah
31
vulnerability VCID-cp4n-p2z3-43b4
32
vulnerability VCID-dc3c-3wab-57gh
33
vulnerability VCID-ddgz-rczw-jqfw
34
vulnerability VCID-dgtq-eaav-jyhf
35
vulnerability VCID-e58m-g37d-9fd6
36
vulnerability VCID-etzn-uhck-h7b2
37
vulnerability VCID-fnj3-2du1-4bhx
38
vulnerability VCID-fp65-97n1-xuaj
39
vulnerability VCID-ggt7-eejg-xfb6
40
vulnerability VCID-gnx2-djyk-uyaf
41
vulnerability VCID-hj8v-tgnn-mfdw
42
vulnerability VCID-hrsy-694u-2fec
43
vulnerability VCID-hudt-78dw-tkf2
44
vulnerability VCID-j2cq-q3r9-jfcp
45
vulnerability VCID-j2qx-np45-4qdu
46
vulnerability VCID-jnfc-8f5d-pyh4
47
vulnerability VCID-jqqf-gmd3-ubcd
48
vulnerability VCID-jtw4-af4y-nkbk
49
vulnerability VCID-ju6h-a1sz-f7e5
50
vulnerability VCID-mkyr-w79c-qqfz
51
vulnerability VCID-ms2r-94ph-yyh3
52
vulnerability VCID-n51k-39uk-auca
53
vulnerability VCID-ph5u-5j8n-4qah
54
vulnerability VCID-q229-ag6u-u3hv
55
vulnerability VCID-qbpd-star-6fgn
56
vulnerability VCID-qdcn-2u3v-b3cv
57
vulnerability VCID-qpfa-s6sd-8yct
58
vulnerability VCID-r7bh-7wur-xffs
59
vulnerability VCID-rmez-cwu2-2ya7
60
vulnerability VCID-s73y-y7v7-43cm
61
vulnerability VCID-sh5a-fmna-wffr
62
vulnerability VCID-syz5-5y6f-s7er
63
vulnerability VCID-t4gn-9fw8-gkc3
64
vulnerability VCID-tz47-j4ey-t7g6
65
vulnerability VCID-u4bx-xqb3-vuef
66
vulnerability VCID-v3qf-6wju-1bg8
67
vulnerability VCID-vxpj-xygq-9be2
68
vulnerability VCID-vyk2-s5ut-ubbz
69
vulnerability VCID-w8ks-xk66-r3fm
70
vulnerability VCID-wrh2-77dv-hbdz
71
vulnerability VCID-wwam-tcmv-kqhc
72
vulnerability VCID-x57x-w8g8-7ybz
73
vulnerability VCID-y32p-52ps-4ug4
74
vulnerability VCID-y4x5-n5m2-x7bq
75
vulnerability VCID-yvdd-ataf-ckf1
76
vulnerability VCID-yxks-8529-23bj
77
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.3
aliases CVE-2016-7167
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt
41
url VCID-mkyr-w79c-qqfz
vulnerability_id VCID-mkyr-w79c-qqfz
summary curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00579
published_at 2026-04-16T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-08T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00595
published_at 2026-04-07T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00587
published_at 2026-04-09T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00586
published_at 2026-04-11T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00582
published_at 2026-04-12T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00583
published_at 2026-04-13T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
2
reference_url https://curl.se/docs/CVE-2025-14017.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
reference_id 2427870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
6
reference_url https://curl.se/docs/CVE-2025-14017.json
reference_id CVE-2025-14017.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.json
7
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
8
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.18.0
purl pkg:generic/curl.se/curl@8.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-8zks-th64-33b8
2
vulnerability VCID-amgy-dw6h-6ydf
3
vulnerability VCID-etzn-uhck-h7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0
aliases CVE-2025-14017
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz
42
url VCID-ph5u-5j8n-4qah
vulnerability_id VCID-ph5u-5j8n-4qah
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31806
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3184
published_at 2026-04-16T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31977
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31797
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31879
published_at 2026-04-09T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31882
published_at 2026-04-11T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31843
published_at 2026-04-12T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
2
reference_url https://curl.se/docs/CVE-2021-22898.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22898.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1176461
reference_id
reference_type
scores
url https://hackerone.com/reports/1176461
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
reference_id 1964887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
reference_id 989228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
22
reference_url https://security.archlinux.org/ASA-202106-4
reference_id ASA-202106-4
reference_type
scores
url https://security.archlinux.org/ASA-202106-4
23
reference_url https://security.archlinux.org/ASA-202106-5
reference_id ASA-202106-5
reference_type
scores
url https://security.archlinux.org/ASA-202106-5
24
reference_url https://security.archlinux.org/ASA-202106-6
reference_id ASA-202106-6
reference_type
scores
url https://security.archlinux.org/ASA-202106-6
25
reference_url https://security.archlinux.org/ASA-202106-7
reference_id ASA-202106-7
reference_type
scores
url https://security.archlinux.org/ASA-202106-7
26
reference_url https://security.archlinux.org/ASA-202106-8
reference_id ASA-202106-8
reference_type
scores
url https://security.archlinux.org/ASA-202106-8
27
reference_url https://security.archlinux.org/ASA-202106-9
reference_id ASA-202106-9
reference_type
scores
url https://security.archlinux.org/ASA-202106-9
28
reference_url https://security.archlinux.org/AVG-1995
reference_id AVG-1995
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1995
29
reference_url https://security.archlinux.org/AVG-1996
reference_id AVG-1996
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1996
30
reference_url https://security.archlinux.org/AVG-1997
reference_id AVG-1997
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1997
31
reference_url https://security.archlinux.org/AVG-1998
reference_id AVG-1998
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1998
32
reference_url https://security.archlinux.org/AVG-1999
reference_id AVG-1999
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1999
33
reference_url https://security.archlinux.org/AVG-2000
reference_id AVG-2000
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2000
34
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
url https://security.gentoo.org/glsa/202105-36
35
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
36
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
37
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
38
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.77.0
purl pkg:generic/curl.se/curl@7.77.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-6we4-n888-6qhe
9
vulnerability VCID-75nw-4e2d-zqgg
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-bdy2-8gub-tfe6
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-dc3c-3wab-57gh
19
vulnerability VCID-ddgz-rczw-jqfw
20
vulnerability VCID-ej47-4dcu-5fhy
21
vulnerability VCID-etzn-uhck-h7b2
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-pwn6-j8vf-rufk
31
vulnerability VCID-q229-ag6u-u3hv
32
vulnerability VCID-qbpd-star-6fgn
33
vulnerability VCID-qdcn-2u3v-b3cv
34
vulnerability VCID-qpux-jh6k-8qhx
35
vulnerability VCID-r7bh-7wur-xffs
36
vulnerability VCID-s73y-y7v7-43cm
37
vulnerability VCID-sh5a-fmna-wffr
38
vulnerability VCID-syz5-5y6f-s7er
39
vulnerability VCID-t1fk-cbsx-j3gh
40
vulnerability VCID-t4gn-9fw8-gkc3
41
vulnerability VCID-t8t6-9wa3-aub7
42
vulnerability VCID-t9p4-2x7v-yfaq
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-wgma-bycg-1qb1
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xpss-yndr-mycj
49
vulnerability VCID-xzay-sjpy-3yce
50
vulnerability VCID-y32p-52ps-4ug4
51
vulnerability VCID-y4x5-n5m2-x7bq
52
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.77.0
aliases CVE-2021-22898
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah
43
url VCID-prff-34kh-kbat
vulnerability_id VCID-prff-34kh-kbat
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://curl.haxx.se/docs/adv_20130412.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20130412.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2013-0771.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0771.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1944
reference_id
reference_type
scores
0
value 0.02482
scoring_system epss
scoring_elements 0.85315
published_at 2026-04-16T12:55:00Z
1
value 0.02482
scoring_system epss
scoring_elements 0.85295
published_at 2026-04-13T12:55:00Z
2
value 0.02482
scoring_system epss
scoring_elements 0.85223
published_at 2026-04-01T12:55:00Z
3
value 0.02482
scoring_system epss
scoring_elements 0.85234
published_at 2026-04-02T12:55:00Z
4
value 0.02482
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-04T12:55:00Z
5
value 0.02482
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-07T12:55:00Z
6
value 0.02482
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-08T12:55:00Z
7
value 0.02482
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-09T12:55:00Z
8
value 0.02482
scoring_system epss
scoring_elements 0.853
published_at 2026-04-11T12:55:00Z
9
value 0.02482
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1944
13
reference_url https://curl.se/docs/CVE-2013-1944.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-1944.html
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
15
reference_url http://secunia.com/advisories/53044
reference_id
reference_type
scores
url http://secunia.com/advisories/53044
16
reference_url http://secunia.com/advisories/53051
reference_id
reference_type
scores
url http://secunia.com/advisories/53051
17
reference_url http://secunia.com/advisories/53097
reference_id
reference_type
scores
url http://secunia.com/advisories/53097
18
reference_url https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66
reference_id
reference_type
scores
url https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66
19
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
20
reference_url http://www.debian.org/security/2012/dsa-2660
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2660
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
22
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
23
reference_url http://www.osvdb.org/92316
reference_id
reference_type
scores
url http://www.osvdb.org/92316
24
reference_url http://www.securityfocus.com/bid/59058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59058
25
reference_url http://www.ubuntu.com/usn/USN-1801-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1801-1
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274
reference_id 705274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950577
reference_id 950577
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950577
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1944
reference_id CVE-2013-1944
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1944
160
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
161
reference_url https://access.redhat.com/errata/RHSA-2013:0771
reference_id RHSA-2013:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0771
162
reference_url https://usn.ubuntu.com/1801-1/
reference_id USN-1801-1
reference_type
scores
url https://usn.ubuntu.com/1801-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.30.0
purl pkg:generic/curl.se/curl@7.30.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mk9-5buz-puh5
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-6muy-xpdq-9kg8
12
vulnerability VCID-6we4-n888-6qhe
13
vulnerability VCID-6yb7-t8qs-cbch
14
vulnerability VCID-7c8e-eaqy-akeu
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-7xxh-66ys-4bhw
18
vulnerability VCID-87qu-j64w-p7fj
19
vulnerability VCID-8zks-th64-33b8
20
vulnerability VCID-9ggp-5wfj-ufcq
21
vulnerability VCID-9nak-pscy-e7gs
22
vulnerability VCID-a3v7-ptf1-6qgd
23
vulnerability VCID-a9b6-m25r-kygw
24
vulnerability VCID-ae59-w7a1-7keg
25
vulnerability VCID-arjz-67yz-wkg9
26
vulnerability VCID-b2ef-zj3u-rbhy
27
vulnerability VCID-bdrx-sm6b-sken
28
vulnerability VCID-bv57-gvfs-qfhj
29
vulnerability VCID-c2na-7q9e-47am
30
vulnerability VCID-c6dk-7gj6-7far
31
vulnerability VCID-cbah-e86c-w3fj
32
vulnerability VCID-cbph-fu9d-gbah
33
vulnerability VCID-cp4n-p2z3-43b4
34
vulnerability VCID-ddgz-rczw-jqfw
35
vulnerability VCID-dgtq-eaav-jyhf
36
vulnerability VCID-dzzd-afgu-3fcy
37
vulnerability VCID-e58m-g37d-9fd6
38
vulnerability VCID-eap9-v2gp-fqgh
39
vulnerability VCID-eer3-29q8-sbgq
40
vulnerability VCID-fnj3-2du1-4bhx
41
vulnerability VCID-fp65-97n1-xuaj
42
vulnerability VCID-ggt7-eejg-xfb6
43
vulnerability VCID-gnx2-djyk-uyaf
44
vulnerability VCID-hj8v-tgnn-mfdw
45
vulnerability VCID-hudt-78dw-tkf2
46
vulnerability VCID-j2qx-np45-4qdu
47
vulnerability VCID-jeqg-g3en-5udw
48
vulnerability VCID-jqqf-gmd3-ubcd
49
vulnerability VCID-jtw4-af4y-nkbk
50
vulnerability VCID-ju6h-a1sz-f7e5
51
vulnerability VCID-k8kj-q1je-f7bt
52
vulnerability VCID-ma8s-he6x-z7a8
53
vulnerability VCID-mkyr-w79c-qqfz
54
vulnerability VCID-ms2r-94ph-yyh3
55
vulnerability VCID-ph5u-5j8n-4qah
56
vulnerability VCID-qbpd-star-6fgn
57
vulnerability VCID-r7bh-7wur-xffs
58
vulnerability VCID-rmez-cwu2-2ya7
59
vulnerability VCID-s73y-y7v7-43cm
60
vulnerability VCID-sh5a-fmna-wffr
61
vulnerability VCID-sknq-8mm1-6qfe
62
vulnerability VCID-snaz-pg1h-8kew
63
vulnerability VCID-syz5-5y6f-s7er
64
vulnerability VCID-t4gn-9fw8-gkc3
65
vulnerability VCID-tmv3-fzje-sbck
66
vulnerability VCID-tz47-j4ey-t7g6
67
vulnerability VCID-vxpj-xygq-9be2
68
vulnerability VCID-vyk2-s5ut-ubbz
69
vulnerability VCID-wc8j-qyp4-tqbd
70
vulnerability VCID-wrh2-77dv-hbdz
71
vulnerability VCID-wwam-tcmv-kqhc
72
vulnerability VCID-xspf-45t1-2uhf
73
vulnerability VCID-y32p-52ps-4ug4
74
vulnerability VCID-y4x5-n5m2-x7bq
75
vulnerability VCID-ya9y-nav3-37hh
76
vulnerability VCID-yvdd-ataf-ckf1
77
vulnerability VCID-yxks-8529-23bj
78
vulnerability VCID-z49y-v1gh-h7gj
79
vulnerability VCID-z8h3-fdj8-xuaa
80
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.30.0
aliases CVE-2013-1944
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat
44
url VCID-r3ny-7kn7-ukaa
vulnerability_id VCID-r3ny-7kn7-ukaa
summary
An error in the X.509 certificate handling of cURL might enable remote
    attackers to conduct man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2417
reference_id
reference_type
scores
0
value 0.0733
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-16T12:55:00Z
1
value 0.0733
scoring_system epss
scoring_elements 0.91653
published_at 2026-04-01T12:55:00Z
2
value 0.0733
scoring_system epss
scoring_elements 0.91661
published_at 2026-04-02T12:55:00Z
3
value 0.0733
scoring_system epss
scoring_elements 0.91666
published_at 2026-04-04T12:55:00Z
4
value 0.0733
scoring_system epss
scoring_elements 0.91675
published_at 2026-04-07T12:55:00Z
5
value 0.0733
scoring_system epss
scoring_elements 0.91688
published_at 2026-04-08T12:55:00Z
6
value 0.0733
scoring_system epss
scoring_elements 0.91694
published_at 2026-04-09T12:55:00Z
7
value 0.0733
scoring_system epss
scoring_elements 0.91697
published_at 2026-04-11T12:55:00Z
8
value 0.0733
scoring_system epss
scoring_elements 0.917
published_at 2026-04-12T12:55:00Z
9
value 0.0733
scoring_system epss
scoring_elements 0.91696
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2417
2
reference_url https://curl.se/docs/CVE-2009-2417.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2009-2417.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516181
reference_id 516181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516181
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991
reference_id 541991
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991
6
reference_url https://security.gentoo.org/glsa/200909-20
reference_id GLSA-200909-20
reference_type
scores
url https://security.gentoo.org/glsa/200909-20
7
reference_url https://access.redhat.com/errata/RHSA-2009:1209
reference_id RHSA-2009:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1209
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
9
reference_url https://usn.ubuntu.com/818-1/
reference_id USN-818-1
reference_type
scores
url https://usn.ubuntu.com/818-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.19.6
purl pkg:generic/curl.se/curl@7.19.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mk9-5buz-puh5
9
vulnerability VCID-6muy-xpdq-9kg8
10
vulnerability VCID-6we4-n888-6qhe
11
vulnerability VCID-6yb7-t8qs-cbch
12
vulnerability VCID-7c8e-eaqy-akeu
13
vulnerability VCID-7srk-hshe-h3f4
14
vulnerability VCID-7xxh-66ys-4bhw
15
vulnerability VCID-87qu-j64w-p7fj
16
vulnerability VCID-8zks-th64-33b8
17
vulnerability VCID-9ggp-5wfj-ufcq
18
vulnerability VCID-9nak-pscy-e7gs
19
vulnerability VCID-a3v7-ptf1-6qgd
20
vulnerability VCID-ae59-w7a1-7keg
21
vulnerability VCID-arjz-67yz-wkg9
22
vulnerability VCID-b2ef-zj3u-rbhy
23
vulnerability VCID-c2na-7q9e-47am
24
vulnerability VCID-c6dk-7gj6-7far
25
vulnerability VCID-cbah-e86c-w3fj
26
vulnerability VCID-ddgz-rczw-jqfw
27
vulnerability VCID-dgtq-eaav-jyhf
28
vulnerability VCID-dj5e-62rt-hkex
29
vulnerability VCID-dzzd-afgu-3fcy
30
vulnerability VCID-e1yx-dxa6-1bba
31
vulnerability VCID-e58m-g37d-9fd6
32
vulnerability VCID-eer3-29q8-sbgq
33
vulnerability VCID-exhe-cmqf-duad
34
vulnerability VCID-fnj3-2du1-4bhx
35
vulnerability VCID-fp65-97n1-xuaj
36
vulnerability VCID-ggt7-eejg-xfb6
37
vulnerability VCID-gnx2-djyk-uyaf
38
vulnerability VCID-hudt-78dw-tkf2
39
vulnerability VCID-jeqg-g3en-5udw
40
vulnerability VCID-jqqf-gmd3-ubcd
41
vulnerability VCID-jtw4-af4y-nkbk
42
vulnerability VCID-k8kj-q1je-f7bt
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ph5u-5j8n-4qah
45
vulnerability VCID-prff-34kh-kbat
46
vulnerability VCID-r7bh-7wur-xffs
47
vulnerability VCID-rmez-cwu2-2ya7
48
vulnerability VCID-s73y-y7v7-43cm
49
vulnerability VCID-sknq-8mm1-6qfe
50
vulnerability VCID-snaz-pg1h-8kew
51
vulnerability VCID-syz5-5y6f-s7er
52
vulnerability VCID-tmv3-fzje-sbck
53
vulnerability VCID-tz47-j4ey-t7g6
54
vulnerability VCID-vxpj-xygq-9be2
55
vulnerability VCID-vyk2-s5ut-ubbz
56
vulnerability VCID-wc8j-qyp4-tqbd
57
vulnerability VCID-wwam-tcmv-kqhc
58
vulnerability VCID-xspf-45t1-2uhf
59
vulnerability VCID-y32p-52ps-4ug4
60
vulnerability VCID-y4x5-n5m2-x7bq
61
vulnerability VCID-yxks-8529-23bj
62
vulnerability VCID-z49y-v1gh-h7gj
63
vulnerability VCID-z8h3-fdj8-xuaa
64
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.6
aliases CVE-2009-2417
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa
45
url VCID-r7bh-7wur-xffs
vulnerability_id VCID-r7bh-7wur-xffs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
reference_id
reference_type
scores
0
value 0.00682
scoring_system epss
scoring_elements 0.71649
published_at 2026-04-16T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.71574
published_at 2026-04-02T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71592
published_at 2026-04-04T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-07T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71605
published_at 2026-04-08T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-09T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71639
published_at 2026-04-11T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71623
published_at 2026-04-12T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71604
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
2
reference_url https://curl.se/docs/CVE-2022-27776.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27776.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1547048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://hackerone.com/reports/1547048
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
reference_id 1010252
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
reference_id 2078408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
reference_id 7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
23
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
reference_id DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
28
reference_url https://security.netapp.com/advisory/ntap-20220609-0008/
reference_id ntap-20220609-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.netapp.com/advisory/ntap-20220609-0008/
29
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
30
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
31
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.0
purl pkg:generic/curl.se/curl@7.83.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-47qb-2qkw-1qej
4
vulnerability VCID-4e1k-7bj9-hfch
5
vulnerability VCID-4gze-cwtp-2bgr
6
vulnerability VCID-6ge5-86tg-dydf
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hjkx-6yep-mkde
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-m15r-v9sr-2bbn
24
vulnerability VCID-mkyr-w79c-qqfz
25
vulnerability VCID-ms2r-94ph-yyh3
26
vulnerability VCID-n57n-cymy-z7dr
27
vulnerability VCID-nvzd-v3bs-6qek
28
vulnerability VCID-pwn6-j8vf-rufk
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-rhxh-77pj-1bfy
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-syz5-5y6f-s7er
34
vulnerability VCID-t1fk-cbsx-j3gh
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-v9n1-d6xt-6ubn
39
vulnerability VCID-vbbv-k1r7-kkas
40
vulnerability VCID-wgma-bycg-1qb1
41
vulnerability VCID-x57x-w8g8-7ybz
42
vulnerability VCID-xpss-yndr-mycj
43
vulnerability VCID-xzay-sjpy-3yce
44
vulnerability VCID-y4x5-n5m2-x7bq
45
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0
aliases CVE-2022-27776
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs
46
url VCID-rmez-cwu2-2ya7
vulnerability_id VCID-rmez-cwu2-2ya7
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28391
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28321
published_at 2026-04-16T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28411
published_at 2026-04-11T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-12T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2831
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28466
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28508
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28299
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28364
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
2
reference_url https://curl.se/docs/CVE-2020-8284.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8284.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1040166
reference_id
reference_type
scores
url https://hackerone.com/reports/1040166
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
reference_id 1902667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
reference_id 977163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
15
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
16
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
17
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
18
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
19
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
20
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
21
reference_url https://usn.ubuntu.com/4665-2/
reference_id USN-4665-2
reference_type
scores
url https://usn.ubuntu.com/4665-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.74.0
purl pkg:generic/curl.se/curl@7.74.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-bdy2-8gub-tfe6
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-ph5u-5j8n-4qah
31
vulnerability VCID-pwn6-j8vf-rufk
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-s73y-y7v7-43cm
38
vulnerability VCID-sh5a-fmna-wffr
39
vulnerability VCID-syz5-5y6f-s7er
40
vulnerability VCID-t1fk-cbsx-j3gh
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-x57x-w8g8-7ybz
47
vulnerability VCID-xzay-sjpy-3yce
48
vulnerability VCID-y32p-52ps-4ug4
49
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0
aliases CVE-2020-8284
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7
47
url VCID-s73y-y7v7-43cm
vulnerability_id VCID-s73y-y7v7-43cm
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-16T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70238
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-04T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-07T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-08T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.70294
published_at 2026-04-09T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70317
published_at 2026-04-11T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-12T12:55:00Z
8
value 0.00631
scoring_system epss
scoring_elements 0.70289
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
2
reference_url https://curl.se/docs/CVE-2023-28322.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28322.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1954658
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://hackerone.com/reports/1954658
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
reference_id 2196793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
20
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
21
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
22
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
23
reference_url https://access.redhat.com/errata/RHSA-2024:0585
reference_id RHSA-2024:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0585
24
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
25
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
26
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
27
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
28
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28322
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm
48
url VCID-sknq-8mm1-6qfe
vulnerability_id VCID-sknq-8mm1-6qfe
summary security update
references
0
reference_url http://curl.haxx.se/docs/adv_20140910A.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20140910A.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
2
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1254.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1254.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3613
reference_id
reference_type
scores
0
value 0.0182
scoring_system epss
scoring_elements 0.82903
published_at 2026-04-16T12:55:00Z
1
value 0.0182
scoring_system epss
scoring_elements 0.82864
published_at 2026-04-13T12:55:00Z
2
value 0.0182
scoring_system epss
scoring_elements 0.82801
published_at 2026-04-01T12:55:00Z
3
value 0.0182
scoring_system epss
scoring_elements 0.82817
published_at 2026-04-02T12:55:00Z
4
value 0.0182
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-04T12:55:00Z
5
value 0.0182
scoring_system epss
scoring_elements 0.82826
published_at 2026-04-07T12:55:00Z
6
value 0.0182
scoring_system epss
scoring_elements 0.82851
published_at 2026-04-08T12:55:00Z
7
value 0.0182
scoring_system epss
scoring_elements 0.82858
published_at 2026-04-09T12:55:00Z
8
value 0.0182
scoring_system epss
scoring_elements 0.82874
published_at 2026-04-11T12:55:00Z
9
value 0.0182
scoring_system epss
scoring_elements 0.82868
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3613
7
reference_url https://curl.se/docs/CVE-2014-3613.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-3613.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2014/dsa-3022
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3022
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
12
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
13
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
14
reference_url http://www.securityfocus.com/bid/69748
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69748
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1136154
reference_id 1136154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1136154
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3613
reference_id CVE-2014-3613
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3613
34
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
35
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
36
reference_url https://usn.ubuntu.com/2346-1/
reference_id USN-2346-1
reference_type
scores
url https://usn.ubuntu.com/2346-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.38.0
purl pkg:generic/curl.se/curl@7.38.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-dzzd-afgu-3fcy
41
vulnerability VCID-e58m-g37d-9fd6
42
vulnerability VCID-eap9-v2gp-fqgh
43
vulnerability VCID-eer3-29q8-sbgq
44
vulnerability VCID-etzn-uhck-h7b2
45
vulnerability VCID-fnj3-2du1-4bhx
46
vulnerability VCID-fp65-97n1-xuaj
47
vulnerability VCID-ggt7-eejg-xfb6
48
vulnerability VCID-gnx2-djyk-uyaf
49
vulnerability VCID-hj8v-tgnn-mfdw
50
vulnerability VCID-hudt-78dw-tkf2
51
vulnerability VCID-j2cq-q3r9-jfcp
52
vulnerability VCID-j2qx-np45-4qdu
53
vulnerability VCID-jeqg-g3en-5udw
54
vulnerability VCID-jqqf-gmd3-ubcd
55
vulnerability VCID-jtw4-af4y-nkbk
56
vulnerability VCID-ju6h-a1sz-f7e5
57
vulnerability VCID-k8kj-q1je-f7bt
58
vulnerability VCID-mkyr-w79c-qqfz
59
vulnerability VCID-ms2r-94ph-yyh3
60
vulnerability VCID-ph5u-5j8n-4qah
61
vulnerability VCID-q229-ag6u-u3hv
62
vulnerability VCID-qbpd-star-6fgn
63
vulnerability VCID-qka4-jfdb-w3d5
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-snaz-pg1h-8kew
69
vulnerability VCID-syz5-5y6f-s7er
70
vulnerability VCID-t4gn-9fw8-gkc3
71
vulnerability VCID-t753-w1ha-kqaz
72
vulnerability VCID-tmv3-fzje-sbck
73
vulnerability VCID-tz47-j4ey-t7g6
74
vulnerability VCID-v3qf-6wju-1bg8
75
vulnerability VCID-vxpj-xygq-9be2
76
vulnerability VCID-vyk2-s5ut-ubbz
77
vulnerability VCID-w8ks-xk66-r3fm
78
vulnerability VCID-wc8j-qyp4-tqbd
79
vulnerability VCID-wh98-pw9h-cyfx
80
vulnerability VCID-wrh2-77dv-hbdz
81
vulnerability VCID-wwam-tcmv-kqhc
82
vulnerability VCID-x57x-w8g8-7ybz
83
vulnerability VCID-xspf-45t1-2uhf
84
vulnerability VCID-y32p-52ps-4ug4
85
vulnerability VCID-y4x5-n5m2-x7bq
86
vulnerability VCID-yvdd-ataf-ckf1
87
vulnerability VCID-yxks-8529-23bj
88
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.38.0
aliases CVE-2014-3613
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe
49
url VCID-snaz-pg1h-8kew
vulnerability_id VCID-snaz-pg1h-8kew
summary cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.
references
0
reference_url http://curl.haxx.se/docs/adv_20160127B.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20160127B.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0754
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57561
published_at 2026-04-16T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-12T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57533
published_at 2026-04-13T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57423
published_at 2026-04-01T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57507
published_at 2026-04-02T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57528
published_at 2026-04-04T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57504
published_at 2026-04-07T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-08T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.5756
published_at 2026-04-09T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57575
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0754
2
reference_url https://curl.se/docs/CVE-2016-0754.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-0754.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0754
reference_id CVE-2016-0754
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0754
fixed_packages
0
url pkg:generic/curl.se/curl@7.47.0
purl pkg:generic/curl.se/curl@7.47.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-7xxh-66ys-4bhw
20
vulnerability VCID-8zks-th64-33b8
21
vulnerability VCID-9ggp-5wfj-ufcq
22
vulnerability VCID-9nak-pscy-e7gs
23
vulnerability VCID-a3v7-ptf1-6qgd
24
vulnerability VCID-a9b6-m25r-kygw
25
vulnerability VCID-ae59-w7a1-7keg
26
vulnerability VCID-arjz-67yz-wkg9
27
vulnerability VCID-bb2f-7qrm-1kca
28
vulnerability VCID-bgtv-jrna-9yb3
29
vulnerability VCID-bhvd-ntxz-dkg4
30
vulnerability VCID-bv57-gvfs-qfhj
31
vulnerability VCID-c6dk-7gj6-7far
32
vulnerability VCID-cbah-e86c-w3fj
33
vulnerability VCID-cbph-fu9d-gbah
34
vulnerability VCID-cp4n-p2z3-43b4
35
vulnerability VCID-dc3c-3wab-57gh
36
vulnerability VCID-ddgz-rczw-jqfw
37
vulnerability VCID-dgtq-eaav-jyhf
38
vulnerability VCID-e58m-g37d-9fd6
39
vulnerability VCID-eap9-v2gp-fqgh
40
vulnerability VCID-etzn-uhck-h7b2
41
vulnerability VCID-fnj3-2du1-4bhx
42
vulnerability VCID-fp65-97n1-xuaj
43
vulnerability VCID-ggt7-eejg-xfb6
44
vulnerability VCID-gnx2-djyk-uyaf
45
vulnerability VCID-hj8v-tgnn-mfdw
46
vulnerability VCID-hrsy-694u-2fec
47
vulnerability VCID-hudt-78dw-tkf2
48
vulnerability VCID-j2cq-q3r9-jfcp
49
vulnerability VCID-j2qx-np45-4qdu
50
vulnerability VCID-jeqg-g3en-5udw
51
vulnerability VCID-jqqf-gmd3-ubcd
52
vulnerability VCID-jtw4-af4y-nkbk
53
vulnerability VCID-ju6h-a1sz-f7e5
54
vulnerability VCID-k8kj-q1je-f7bt
55
vulnerability VCID-mkyr-w79c-qqfz
56
vulnerability VCID-ms2r-94ph-yyh3
57
vulnerability VCID-n51k-39uk-auca
58
vulnerability VCID-ph5u-5j8n-4qah
59
vulnerability VCID-q229-ag6u-u3hv
60
vulnerability VCID-qbpd-star-6fgn
61
vulnerability VCID-qdcn-2u3v-b3cv
62
vulnerability VCID-qpfa-s6sd-8yct
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-syz5-5y6f-s7er
68
vulnerability VCID-t4gn-9fw8-gkc3
69
vulnerability VCID-tz47-j4ey-t7g6
70
vulnerability VCID-u4bx-xqb3-vuef
71
vulnerability VCID-v3qf-6wju-1bg8
72
vulnerability VCID-vxpj-xygq-9be2
73
vulnerability VCID-vyk2-s5ut-ubbz
74
vulnerability VCID-w8ks-xk66-r3fm
75
vulnerability VCID-wc8j-qyp4-tqbd
76
vulnerability VCID-wrh2-77dv-hbdz
77
vulnerability VCID-wwam-tcmv-kqhc
78
vulnerability VCID-x57x-w8g8-7ybz
79
vulnerability VCID-y32p-52ps-4ug4
80
vulnerability VCID-y4x5-n5m2-x7bq
81
vulnerability VCID-yvdd-ataf-ckf1
82
vulnerability VCID-yxks-8529-23bj
83
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0
aliases CVE-2016-0754
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew
50
url VCID-tmv3-fzje-sbck
vulnerability_id VCID-tmv3-fzje-sbck
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3148
reference_id
reference_type
scores
0
value 0.01686
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-16T12:55:00Z
1
value 0.01686
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-01T12:55:00Z
2
value 0.01686
scoring_system epss
scoring_elements 0.8215
published_at 2026-04-02T12:55:00Z
3
value 0.01686
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-04T12:55:00Z
4
value 0.01686
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-07T12:55:00Z
5
value 0.01686
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-08T12:55:00Z
6
value 0.01686
scoring_system epss
scoring_elements 0.82202
published_at 2026-04-09T12:55:00Z
7
value 0.01686
scoring_system epss
scoring_elements 0.82221
published_at 2026-04-11T12:55:00Z
8
value 0.01686
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-12T12:55:00Z
9
value 0.01686
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3148
2
reference_url https://curl.se/docs/CVE-2015-3148.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3148.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213351
reference_id 1213351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213351
6
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
8
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
9
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.42.0
purl pkg:generic/curl.se/curl@7.42.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-e58m-g37d-9fd6
41
vulnerability VCID-eap9-v2gp-fqgh
42
vulnerability VCID-etzn-uhck-h7b2
43
vulnerability VCID-fnj3-2du1-4bhx
44
vulnerability VCID-fp65-97n1-xuaj
45
vulnerability VCID-ggt7-eejg-xfb6
46
vulnerability VCID-gnx2-djyk-uyaf
47
vulnerability VCID-hj8v-tgnn-mfdw
48
vulnerability VCID-hrsy-694u-2fec
49
vulnerability VCID-hudt-78dw-tkf2
50
vulnerability VCID-j2cq-q3r9-jfcp
51
vulnerability VCID-j2qx-np45-4qdu
52
vulnerability VCID-jeqg-g3en-5udw
53
vulnerability VCID-jqqf-gmd3-ubcd
54
vulnerability VCID-jtw4-af4y-nkbk
55
vulnerability VCID-ju6h-a1sz-f7e5
56
vulnerability VCID-k8kj-q1je-f7bt
57
vulnerability VCID-mkyr-w79c-qqfz
58
vulnerability VCID-ms2r-94ph-yyh3
59
vulnerability VCID-n51k-39uk-auca
60
vulnerability VCID-ph5u-5j8n-4qah
61
vulnerability VCID-q229-ag6u-u3hv
62
vulnerability VCID-qbpd-star-6fgn
63
vulnerability VCID-r447-deb8-2ydj
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-snaz-pg1h-8kew
69
vulnerability VCID-syz5-5y6f-s7er
70
vulnerability VCID-t4gn-9fw8-gkc3
71
vulnerability VCID-tz47-j4ey-t7g6
72
vulnerability VCID-v3qf-6wju-1bg8
73
vulnerability VCID-vxpj-xygq-9be2
74
vulnerability VCID-vyk2-s5ut-ubbz
75
vulnerability VCID-w8ks-xk66-r3fm
76
vulnerability VCID-wc8j-qyp4-tqbd
77
vulnerability VCID-wrh2-77dv-hbdz
78
vulnerability VCID-wwam-tcmv-kqhc
79
vulnerability VCID-x57x-w8g8-7ybz
80
vulnerability VCID-y32p-52ps-4ug4
81
vulnerability VCID-y4x5-n5m2-x7bq
82
vulnerability VCID-yubp-g4rt-c3e6
83
vulnerability VCID-yvdd-ataf-ckf1
84
vulnerability VCID-yxks-8529-23bj
85
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0
aliases CVE-2015-3148
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck
51
url VCID-tz47-j4ey-t7g6
vulnerability_id VCID-tz47-j4ey-t7g6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65733
published_at 2026-04-16T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65698
published_at 2026-04-13T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69387
published_at 2026-04-01T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-02T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-04T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-07T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69444
published_at 2026-04-08T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.6946
published_at 2026-04-09T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-11T12:55:00Z
9
value 0.006
scoring_system epss
scoring_elements 0.69466
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
2
reference_url https://curl.se/docs/CVE-2018-14618.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-14618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
reference_id 1622707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
reference_id 908327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
7
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
8
reference_url https://access.redhat.com/errata/RHSA-2019:1880
reference_id RHSA-2019:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1880
9
reference_url https://usn.ubuntu.com/3765-1/
reference_id USN-3765-1
reference_type
scores
url https://usn.ubuntu.com/3765-1/
10
reference_url https://usn.ubuntu.com/3765-2/
reference_id USN-3765-2
reference_type
scores
url https://usn.ubuntu.com/3765-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.61.1
purl pkg:generic/curl.se/curl@7.61.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-75nw-4e2d-zqgg
11
vulnerability VCID-79sv-kzb5-hbc4
12
vulnerability VCID-7srk-hshe-h3f4
13
vulnerability VCID-8zks-th64-33b8
14
vulnerability VCID-9cbd-x468-rkaw
15
vulnerability VCID-9ggp-5wfj-ufcq
16
vulnerability VCID-9nak-pscy-e7gs
17
vulnerability VCID-arjz-67yz-wkg9
18
vulnerability VCID-bb2f-7qrm-1kca
19
vulnerability VCID-cbah-e86c-w3fj
20
vulnerability VCID-cp4n-p2z3-43b4
21
vulnerability VCID-d3s1-3qs7-2uhw
22
vulnerability VCID-dc3c-3wab-57gh
23
vulnerability VCID-ddgz-rczw-jqfw
24
vulnerability VCID-dhrf-2sz5-3bhf
25
vulnerability VCID-etzn-uhck-h7b2
26
vulnerability VCID-ggt7-eejg-xfb6
27
vulnerability VCID-gnx2-djyk-uyaf
28
vulnerability VCID-hrsy-694u-2fec
29
vulnerability VCID-hudt-78dw-tkf2
30
vulnerability VCID-ju6h-a1sz-f7e5
31
vulnerability VCID-mkyr-w79c-qqfz
32
vulnerability VCID-ms2r-94ph-yyh3
33
vulnerability VCID-n51k-39uk-auca
34
vulnerability VCID-n57n-cymy-z7dr
35
vulnerability VCID-nvzd-v3bs-6qek
36
vulnerability VCID-ph5u-5j8n-4qah
37
vulnerability VCID-q229-ag6u-u3hv
38
vulnerability VCID-qbpd-star-6fgn
39
vulnerability VCID-qdcn-2u3v-b3cv
40
vulnerability VCID-qpfa-s6sd-8yct
41
vulnerability VCID-r7bh-7wur-xffs
42
vulnerability VCID-rmez-cwu2-2ya7
43
vulnerability VCID-s73y-y7v7-43cm
44
vulnerability VCID-sh5a-fmna-wffr
45
vulnerability VCID-syz5-5y6f-s7er
46
vulnerability VCID-t4gn-9fw8-gkc3
47
vulnerability VCID-u4bx-xqb3-vuef
48
vulnerability VCID-v3qf-6wju-1bg8
49
vulnerability VCID-vbbv-k1r7-kkas
50
vulnerability VCID-w8ks-xk66-r3fm
51
vulnerability VCID-wwam-tcmv-kqhc
52
vulnerability VCID-x57x-w8g8-7ybz
53
vulnerability VCID-xzay-sjpy-3yce
54
vulnerability VCID-y32p-52ps-4ug4
55
vulnerability VCID-y4x5-n5m2-x7bq
56
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.61.1
aliases CVE-2018-14618
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6
52
url VCID-vxpj-xygq-9be2
vulnerability_id VCID-vxpj-xygq-9be2
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-01T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.8487
published_at 2026-04-16T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-02T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-04T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-07T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-08T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84839
published_at 2026-04-09T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-11T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-12T12:55:00Z
9
value 0.02337
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
2
reference_url https://curl.se/docs/CVE-2016-8615.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8615.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
reference_id 1388370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8615
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2
53
url VCID-vyk2-s5ut-ubbz
vulnerability_id VCID-vyk2-s5ut-ubbz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
reference_id
reference_type
scores
0
value 0.01654
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-01T12:55:00Z
1
value 0.01654
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-16T12:55:00Z
2
value 0.01654
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-07T12:55:00Z
3
value 0.01654
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-08T12:55:00Z
4
value 0.01654
scoring_system epss
scoring_elements 0.82031
published_at 2026-04-09T12:55:00Z
5
value 0.01654
scoring_system epss
scoring_elements 0.82051
published_at 2026-04-11T12:55:00Z
6
value 0.01654
scoring_system epss
scoring_elements 0.8204
published_at 2026-04-12T12:55:00Z
7
value 0.01654
scoring_system epss
scoring_elements 0.82033
published_at 2026-04-13T12:55:00Z
8
value 0.01654
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-02T12:55:00Z
9
value 0.01654
scoring_system epss
scoring_elements 0.82001
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
2
reference_url https://curl.se/docs/CVE-2016-8618.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
reference_id 1388378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
19
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
20
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8618
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz
54
url VCID-wc8j-qyp4-tqbd
vulnerability_id VCID-wc8j-qyp4-tqbd
summary Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4802
reference_id
reference_type
scores
0
value 0.00612
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-16T12:55:00Z
1
value 0.00612
scoring_system epss
scoring_elements 0.69815
published_at 2026-04-12T12:55:00Z
2
value 0.00612
scoring_system epss
scoring_elements 0.698
published_at 2026-04-13T12:55:00Z
3
value 0.00612
scoring_system epss
scoring_elements 0.6974
published_at 2026-04-01T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.69751
published_at 2026-04-02T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-04T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.69743
published_at 2026-04-07T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.69791
published_at 2026-04-08T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.69807
published_at 2026-04-09T12:55:00Z
9
value 0.00612
scoring_system epss
scoring_elements 0.6983
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4802
1
reference_url https://curl.haxx.se/docs/adv_20160530.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20160530.html
2
reference_url https://curl.se/docs/CVE-2016-4802.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-4802.html
3
reference_url http://www.securityfocus.com/bid/90997
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90997
4
reference_url http://www.securitytracker.com/id/1036008
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036008
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4802
reference_id CVE-2016-4802
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4802
fixed_packages
0
url pkg:generic/curl.se/curl@7.49.1
purl pkg:generic/curl.se/curl@7.49.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7srk-hshe-h3f4
18
vulnerability VCID-7vt9-pf5q-uqb6
19
vulnerability VCID-7xxh-66ys-4bhw
20
vulnerability VCID-8zks-th64-33b8
21
vulnerability VCID-9ggp-5wfj-ufcq
22
vulnerability VCID-9nak-pscy-e7gs
23
vulnerability VCID-a3v7-ptf1-6qgd
24
vulnerability VCID-a9b6-m25r-kygw
25
vulnerability VCID-ae59-w7a1-7keg
26
vulnerability VCID-arjz-67yz-wkg9
27
vulnerability VCID-bb2f-7qrm-1kca
28
vulnerability VCID-bgtv-jrna-9yb3
29
vulnerability VCID-bhvd-ntxz-dkg4
30
vulnerability VCID-bv57-gvfs-qfhj
31
vulnerability VCID-c6dk-7gj6-7far
32
vulnerability VCID-cbah-e86c-w3fj
33
vulnerability VCID-cbph-fu9d-gbah
34
vulnerability VCID-cp4n-p2z3-43b4
35
vulnerability VCID-dc3c-3wab-57gh
36
vulnerability VCID-ddgz-rczw-jqfw
37
vulnerability VCID-dgtq-eaav-jyhf
38
vulnerability VCID-e58m-g37d-9fd6
39
vulnerability VCID-etzn-uhck-h7b2
40
vulnerability VCID-fnj3-2du1-4bhx
41
vulnerability VCID-fp65-97n1-xuaj
42
vulnerability VCID-ggt7-eejg-xfb6
43
vulnerability VCID-gnx2-djyk-uyaf
44
vulnerability VCID-hj8v-tgnn-mfdw
45
vulnerability VCID-hrsy-694u-2fec
46
vulnerability VCID-hudt-78dw-tkf2
47
vulnerability VCID-j2cq-q3r9-jfcp
48
vulnerability VCID-j2qx-np45-4qdu
49
vulnerability VCID-jeqg-g3en-5udw
50
vulnerability VCID-jnfc-8f5d-pyh4
51
vulnerability VCID-jqqf-gmd3-ubcd
52
vulnerability VCID-jtw4-af4y-nkbk
53
vulnerability VCID-ju6h-a1sz-f7e5
54
vulnerability VCID-k8kj-q1je-f7bt
55
vulnerability VCID-mkyr-w79c-qqfz
56
vulnerability VCID-ms2r-94ph-yyh3
57
vulnerability VCID-n51k-39uk-auca
58
vulnerability VCID-ph5u-5j8n-4qah
59
vulnerability VCID-q229-ag6u-u3hv
60
vulnerability VCID-qbpd-star-6fgn
61
vulnerability VCID-qdcn-2u3v-b3cv
62
vulnerability VCID-qpfa-s6sd-8yct
63
vulnerability VCID-r7bh-7wur-xffs
64
vulnerability VCID-rmez-cwu2-2ya7
65
vulnerability VCID-s73y-y7v7-43cm
66
vulnerability VCID-sh5a-fmna-wffr
67
vulnerability VCID-syz5-5y6f-s7er
68
vulnerability VCID-t4gn-9fw8-gkc3
69
vulnerability VCID-tz47-j4ey-t7g6
70
vulnerability VCID-u4bx-xqb3-vuef
71
vulnerability VCID-v3qf-6wju-1bg8
72
vulnerability VCID-vxpj-xygq-9be2
73
vulnerability VCID-vyk2-s5ut-ubbz
74
vulnerability VCID-w8ks-xk66-r3fm
75
vulnerability VCID-wrh2-77dv-hbdz
76
vulnerability VCID-wwam-tcmv-kqhc
77
vulnerability VCID-x57x-w8g8-7ybz
78
vulnerability VCID-y32p-52ps-4ug4
79
vulnerability VCID-y4x5-n5m2-x7bq
80
vulnerability VCID-yvdd-ataf-ckf1
81
vulnerability VCID-yxks-8529-23bj
82
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.49.1
aliases CVE-2016-4802
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd
55
url VCID-xspf-45t1-2uhf
vulnerability_id VCID-xspf-45t1-2uhf
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3143
reference_id
reference_type
scores
0
value 0.03475
scoring_system epss
scoring_elements 0.8757
published_at 2026-04-16T12:55:00Z
1
value 0.03475
scoring_system epss
scoring_elements 0.875
published_at 2026-04-01T12:55:00Z
2
value 0.03475
scoring_system epss
scoring_elements 0.8751
published_at 2026-04-02T12:55:00Z
3
value 0.03475
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-04T12:55:00Z
4
value 0.03475
scoring_system epss
scoring_elements 0.87526
published_at 2026-04-07T12:55:00Z
5
value 0.03475
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-08T12:55:00Z
6
value 0.03475
scoring_system epss
scoring_elements 0.87552
published_at 2026-04-09T12:55:00Z
7
value 0.03475
scoring_system epss
scoring_elements 0.87563
published_at 2026-04-11T12:55:00Z
8
value 0.03475
scoring_system epss
scoring_elements 0.87559
published_at 2026-04-12T12:55:00Z
9
value 0.03475
scoring_system epss
scoring_elements 0.87556
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3143
2
reference_url https://curl.se/docs/CVE-2015-3143.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3143.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213306
reference_id 1213306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213306
6
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
8
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
9
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.42.0
purl pkg:generic/curl.se/curl@7.42.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-e58m-g37d-9fd6
41
vulnerability VCID-eap9-v2gp-fqgh
42
vulnerability VCID-etzn-uhck-h7b2
43
vulnerability VCID-fnj3-2du1-4bhx
44
vulnerability VCID-fp65-97n1-xuaj
45
vulnerability VCID-ggt7-eejg-xfb6
46
vulnerability VCID-gnx2-djyk-uyaf
47
vulnerability VCID-hj8v-tgnn-mfdw
48
vulnerability VCID-hrsy-694u-2fec
49
vulnerability VCID-hudt-78dw-tkf2
50
vulnerability VCID-j2cq-q3r9-jfcp
51
vulnerability VCID-j2qx-np45-4qdu
52
vulnerability VCID-jeqg-g3en-5udw
53
vulnerability VCID-jqqf-gmd3-ubcd
54
vulnerability VCID-jtw4-af4y-nkbk
55
vulnerability VCID-ju6h-a1sz-f7e5
56
vulnerability VCID-k8kj-q1je-f7bt
57
vulnerability VCID-mkyr-w79c-qqfz
58
vulnerability VCID-ms2r-94ph-yyh3
59
vulnerability VCID-n51k-39uk-auca
60
vulnerability VCID-ph5u-5j8n-4qah
61
vulnerability VCID-q229-ag6u-u3hv
62
vulnerability VCID-qbpd-star-6fgn
63
vulnerability VCID-r447-deb8-2ydj
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-snaz-pg1h-8kew
69
vulnerability VCID-syz5-5y6f-s7er
70
vulnerability VCID-t4gn-9fw8-gkc3
71
vulnerability VCID-tz47-j4ey-t7g6
72
vulnerability VCID-v3qf-6wju-1bg8
73
vulnerability VCID-vxpj-xygq-9be2
74
vulnerability VCID-vyk2-s5ut-ubbz
75
vulnerability VCID-w8ks-xk66-r3fm
76
vulnerability VCID-wc8j-qyp4-tqbd
77
vulnerability VCID-wrh2-77dv-hbdz
78
vulnerability VCID-wwam-tcmv-kqhc
79
vulnerability VCID-x57x-w8g8-7ybz
80
vulnerability VCID-y32p-52ps-4ug4
81
vulnerability VCID-y4x5-n5m2-x7bq
82
vulnerability VCID-yubp-g4rt-c3e6
83
vulnerability VCID-yvdd-ataf-ckf1
84
vulnerability VCID-yxks-8529-23bj
85
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0
aliases CVE-2015-3143
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf
56
url VCID-y32p-52ps-4ug4
vulnerability_id VCID-y32p-52ps-4ug4
summary
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-02T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-07T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73107
published_at 2026-04-16T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-13T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.7307
published_at 2026-04-12T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73091
published_at 2026-04-11T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.73066
published_at 2026-04-09T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-08T12:55:00Z
9
value 0.00746
scoring_system epss
scoring_elements 0.73042
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
2
reference_url https://curl.se/docs/CVE-2021-22924.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22924.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1223565
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://hackerone.com/reports/1223565
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
reference_id 1981460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
reference_id 991492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
22
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
23
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
24
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
25
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
26
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
27
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
28
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
29
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
30
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
31
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
32
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
33
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
reference_id CVE-2021-22924
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
35
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://www.debian.org/security/2022/dsa-5197
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
37
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
38
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
39
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
40
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
44
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
45
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
46
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
47
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
reference_id ssa-732250.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
48
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22924
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4
57
url VCID-y4x5-n5m2-x7bq
vulnerability_id VCID-y4x5-n5m2-x7bq
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37884
published_at 2026-04-16T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37819
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.3787
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37883
published_at 2026-04-09T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37862
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
2
reference_url https://curl.se/docs/CVE-2022-32208.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32208.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1590071
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://hackerone.com/reports/1590071
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
reference_id 2099306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
23
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://support.apple.com/kb/HT213488
28
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
29
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
30
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
31
reference_url https://access.redhat.com/errata/RHSA-2022:6159
reference_id RHSA-2022:6159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6159
32
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
33
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
34
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
35
reference_url https://usn.ubuntu.com/5499-1/
reference_id USN-5499-1
reference_type
scores
url https://usn.ubuntu.com/5499-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.84.0
purl pkg:generic/curl.se/curl@7.84.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-4seq-hvbx-7fg8
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bz4u-6rft-s3a8
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-ddgz-rczw-jqfw
16
vulnerability VCID-ej47-4dcu-5fhy
17
vulnerability VCID-etzn-uhck-h7b2
18
vulnerability VCID-gnx2-djyk-uyaf
19
vulnerability VCID-hrsy-694u-2fec
20
vulnerability VCID-m15r-v9sr-2bbn
21
vulnerability VCID-mkyr-w79c-qqfz
22
vulnerability VCID-ms2r-94ph-yyh3
23
vulnerability VCID-n57n-cymy-z7dr
24
vulnerability VCID-nvzd-v3bs-6qek
25
vulnerability VCID-pwn6-j8vf-rufk
26
vulnerability VCID-qdcn-2u3v-b3cv
27
vulnerability VCID-qpux-jh6k-8qhx
28
vulnerability VCID-rg54-svzj-x7f9
29
vulnerability VCID-s73y-y7v7-43cm
30
vulnerability VCID-syz5-5y6f-s7er
31
vulnerability VCID-t9p4-2x7v-yfaq
32
vulnerability VCID-tcqe-7skm-b3fz
33
vulnerability VCID-u4bx-xqb3-vuef
34
vulnerability VCID-vbbv-k1r7-kkas
35
vulnerability VCID-wgma-bycg-1qb1
36
vulnerability VCID-x57x-w8g8-7ybz
37
vulnerability VCID-xpss-yndr-mycj
38
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.84.0
aliases CVE-2022-32208
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq
58
url VCID-yxks-8529-23bj
vulnerability_id VCID-yxks-8529-23bj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
reference_id
reference_type
scores
0
value 0.01526
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-01T12:55:00Z
1
value 0.01526
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-16T12:55:00Z
2
value 0.01526
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-02T12:55:00Z
3
value 0.01526
scoring_system epss
scoring_elements 0.81251
published_at 2026-04-04T12:55:00Z
4
value 0.01526
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-07T12:55:00Z
5
value 0.01526
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-08T12:55:00Z
6
value 0.01526
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-13T12:55:00Z
7
value 0.01526
scoring_system epss
scoring_elements 0.81304
published_at 2026-04-11T12:55:00Z
8
value 0.01526
scoring_system epss
scoring_elements 0.8129
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
2
reference_url https://curl.se/docs/CVE-2016-8625.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8625.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
reference_id 1388392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
6
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
7
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
8
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
9
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
10
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
11
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
12
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
13
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
14
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
15
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
16
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
17
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
18
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8625
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj
59
url VCID-z49y-v1gh-h7gj
vulnerability_id VCID-z49y-v1gh-h7gj
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2174
reference_id
reference_type
scores
0
value 0.03181
scoring_system epss
scoring_elements 0.86981
published_at 2026-04-16T12:55:00Z
1
value 0.03181
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-01T12:55:00Z
2
value 0.03181
scoring_system epss
scoring_elements 0.86923
published_at 2026-04-02T12:55:00Z
3
value 0.03181
scoring_system epss
scoring_elements 0.86942
published_at 2026-04-04T12:55:00Z
4
value 0.03181
scoring_system epss
scoring_elements 0.86936
published_at 2026-04-07T12:55:00Z
5
value 0.03181
scoring_system epss
scoring_elements 0.86956
published_at 2026-04-08T12:55:00Z
6
value 0.03181
scoring_system epss
scoring_elements 0.86963
published_at 2026-04-09T12:55:00Z
7
value 0.03181
scoring_system epss
scoring_elements 0.86977
published_at 2026-04-11T12:55:00Z
8
value 0.03181
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-12T12:55:00Z
9
value 0.03181
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2174
2
reference_url https://curl.se/docs/CVE-2013-2174.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-2174.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=965640
reference_id 965640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=965640
5
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
6
reference_url https://access.redhat.com/errata/RHSA-2013:0983
reference_id RHSA-2013:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0983
7
reference_url https://usn.ubuntu.com/1894-1/
reference_id USN-1894-1
reference_type
scores
url https://usn.ubuntu.com/1894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.31.0
purl pkg:generic/curl.se/curl@7.31.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-26ju-84rx-c7b9
2
vulnerability VCID-29n1-4u2b-tkgj
3
vulnerability VCID-2b39-ubrt-hkc6
4
vulnerability VCID-2cx5-1qnw-uufj
5
vulnerability VCID-2xmp-jc8v-bucb
6
vulnerability VCID-3sy2-4f3g-zkac
7
vulnerability VCID-47qb-2qkw-1qej
8
vulnerability VCID-4mk9-5buz-puh5
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-6muy-xpdq-9kg8
12
vulnerability VCID-6we4-n888-6qhe
13
vulnerability VCID-6yb7-t8qs-cbch
14
vulnerability VCID-7c8e-eaqy-akeu
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-7xxh-66ys-4bhw
18
vulnerability VCID-87qu-j64w-p7fj
19
vulnerability VCID-8zks-th64-33b8
20
vulnerability VCID-9ggp-5wfj-ufcq
21
vulnerability VCID-9nak-pscy-e7gs
22
vulnerability VCID-a3v7-ptf1-6qgd
23
vulnerability VCID-a9b6-m25r-kygw
24
vulnerability VCID-ae59-w7a1-7keg
25
vulnerability VCID-arjz-67yz-wkg9
26
vulnerability VCID-b2ef-zj3u-rbhy
27
vulnerability VCID-bdrx-sm6b-sken
28
vulnerability VCID-bv57-gvfs-qfhj
29
vulnerability VCID-c2na-7q9e-47am
30
vulnerability VCID-c6dk-7gj6-7far
31
vulnerability VCID-cbah-e86c-w3fj
32
vulnerability VCID-cbph-fu9d-gbah
33
vulnerability VCID-cp4n-p2z3-43b4
34
vulnerability VCID-ddgz-rczw-jqfw
35
vulnerability VCID-dgtq-eaav-jyhf
36
vulnerability VCID-dzzd-afgu-3fcy
37
vulnerability VCID-e58m-g37d-9fd6
38
vulnerability VCID-eap9-v2gp-fqgh
39
vulnerability VCID-eer3-29q8-sbgq
40
vulnerability VCID-ekav-zg3k-v3ea
41
vulnerability VCID-fnj3-2du1-4bhx
42
vulnerability VCID-fp65-97n1-xuaj
43
vulnerability VCID-ggt7-eejg-xfb6
44
vulnerability VCID-gnx2-djyk-uyaf
45
vulnerability VCID-hj8v-tgnn-mfdw
46
vulnerability VCID-hudt-78dw-tkf2
47
vulnerability VCID-j2qx-np45-4qdu
48
vulnerability VCID-jeqg-g3en-5udw
49
vulnerability VCID-jqqf-gmd3-ubcd
50
vulnerability VCID-jtw4-af4y-nkbk
51
vulnerability VCID-ju6h-a1sz-f7e5
52
vulnerability VCID-k8kj-q1je-f7bt
53
vulnerability VCID-ma8s-he6x-z7a8
54
vulnerability VCID-mkyr-w79c-qqfz
55
vulnerability VCID-ms2r-94ph-yyh3
56
vulnerability VCID-ph5u-5j8n-4qah
57
vulnerability VCID-qbpd-star-6fgn
58
vulnerability VCID-r7bh-7wur-xffs
59
vulnerability VCID-rmez-cwu2-2ya7
60
vulnerability VCID-s73y-y7v7-43cm
61
vulnerability VCID-sh5a-fmna-wffr
62
vulnerability VCID-sknq-8mm1-6qfe
63
vulnerability VCID-snaz-pg1h-8kew
64
vulnerability VCID-syz5-5y6f-s7er
65
vulnerability VCID-t4gn-9fw8-gkc3
66
vulnerability VCID-t753-w1ha-kqaz
67
vulnerability VCID-tmv3-fzje-sbck
68
vulnerability VCID-tz47-j4ey-t7g6
69
vulnerability VCID-vxpj-xygq-9be2
70
vulnerability VCID-vyk2-s5ut-ubbz
71
vulnerability VCID-wc8j-qyp4-tqbd
72
vulnerability VCID-wh98-pw9h-cyfx
73
vulnerability VCID-wrh2-77dv-hbdz
74
vulnerability VCID-wwam-tcmv-kqhc
75
vulnerability VCID-xspf-45t1-2uhf
76
vulnerability VCID-y32p-52ps-4ug4
77
vulnerability VCID-y4x5-n5m2-x7bq
78
vulnerability VCID-ya9y-nav3-37hh
79
vulnerability VCID-yvdd-ataf-ckf1
80
vulnerability VCID-yxks-8529-23bj
81
vulnerability VCID-z8h3-fdj8-xuaa
82
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.31.0
aliases CVE-2013-2174
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj
60
url VCID-z8h3-fdj8-xuaa
vulnerability_id VCID-z8h3-fdj8-xuaa
summary
Multiple vulnerabilities have been discovered in cURL, the worst of
    which could lead to man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0138
reference_id
reference_type
scores
0
value 0.00676
scoring_system epss
scoring_elements 0.71517
published_at 2026-04-16T12:55:00Z
1
value 0.00676
scoring_system epss
scoring_elements 0.71431
published_at 2026-04-07T12:55:00Z
2
value 0.00676
scoring_system epss
scoring_elements 0.71439
published_at 2026-04-02T12:55:00Z
3
value 0.00676
scoring_system epss
scoring_elements 0.71457
published_at 2026-04-04T12:55:00Z
4
value 0.00676
scoring_system epss
scoring_elements 0.71471
published_at 2026-04-08T12:55:00Z
5
value 0.00676
scoring_system epss
scoring_elements 0.71483
published_at 2026-04-09T12:55:00Z
6
value 0.00676
scoring_system epss
scoring_elements 0.71506
published_at 2026-04-11T12:55:00Z
7
value 0.00676
scoring_system epss
scoring_elements 0.7149
published_at 2026-04-12T12:55:00Z
8
value 0.00676
scoring_system epss
scoring_elements 0.71472
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0138
2
reference_url https://curl.se/docs/CVE-2014-0138.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0138.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079148
reference_id 1079148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079148
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
reference_id 742728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
7
reference_url https://security.gentoo.org/glsa/201406-21
reference_id GLSA-201406-21
reference_type
scores
url https://security.gentoo.org/glsa/201406-21
8
reference_url https://access.redhat.com/errata/RHSA-2014:0561
reference_id RHSA-2014:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0561
9
reference_url https://usn.ubuntu.com/2167-1/
reference_id USN-2167-1
reference_type
scores
url https://usn.ubuntu.com/2167-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.36.0
purl pkg:generic/curl.se/curl@7.36.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5jan-pqf6-fyhr
11
vulnerability VCID-5n7a-9j23-e7dj
12
vulnerability VCID-6muy-xpdq-9kg8
13
vulnerability VCID-6we4-n888-6qhe
14
vulnerability VCID-6yb7-t8qs-cbch
15
vulnerability VCID-75nw-4e2d-zqgg
16
vulnerability VCID-79sv-kzb5-hbc4
17
vulnerability VCID-7c8e-eaqy-akeu
18
vulnerability VCID-7srk-hshe-h3f4
19
vulnerability VCID-7vt9-pf5q-uqb6
20
vulnerability VCID-7xxh-66ys-4bhw
21
vulnerability VCID-8zks-th64-33b8
22
vulnerability VCID-9ggp-5wfj-ufcq
23
vulnerability VCID-9nak-pscy-e7gs
24
vulnerability VCID-a3v7-ptf1-6qgd
25
vulnerability VCID-a9b6-m25r-kygw
26
vulnerability VCID-ae59-w7a1-7keg
27
vulnerability VCID-arjz-67yz-wkg9
28
vulnerability VCID-b2ef-zj3u-rbhy
29
vulnerability VCID-bb2f-7qrm-1kca
30
vulnerability VCID-bgtv-jrna-9yb3
31
vulnerability VCID-bhvd-ntxz-dkg4
32
vulnerability VCID-bv57-gvfs-qfhj
33
vulnerability VCID-c6dk-7gj6-7far
34
vulnerability VCID-cbah-e86c-w3fj
35
vulnerability VCID-cbph-fu9d-gbah
36
vulnerability VCID-cp4n-p2z3-43b4
37
vulnerability VCID-dc3c-3wab-57gh
38
vulnerability VCID-ddgz-rczw-jqfw
39
vulnerability VCID-dgtq-eaav-jyhf
40
vulnerability VCID-dzzd-afgu-3fcy
41
vulnerability VCID-e58m-g37d-9fd6
42
vulnerability VCID-eap9-v2gp-fqgh
43
vulnerability VCID-eer3-29q8-sbgq
44
vulnerability VCID-ekav-zg3k-v3ea
45
vulnerability VCID-etzn-uhck-h7b2
46
vulnerability VCID-fnj3-2du1-4bhx
47
vulnerability VCID-fp65-97n1-xuaj
48
vulnerability VCID-ggt7-eejg-xfb6
49
vulnerability VCID-gnx2-djyk-uyaf
50
vulnerability VCID-hj8v-tgnn-mfdw
51
vulnerability VCID-hudt-78dw-tkf2
52
vulnerability VCID-j2cq-q3r9-jfcp
53
vulnerability VCID-j2qx-np45-4qdu
54
vulnerability VCID-jeqg-g3en-5udw
55
vulnerability VCID-jqqf-gmd3-ubcd
56
vulnerability VCID-jtw4-af4y-nkbk
57
vulnerability VCID-ju6h-a1sz-f7e5
58
vulnerability VCID-k8kj-q1je-f7bt
59
vulnerability VCID-mkyr-w79c-qqfz
60
vulnerability VCID-ms2r-94ph-yyh3
61
vulnerability VCID-ph5u-5j8n-4qah
62
vulnerability VCID-q229-ag6u-u3hv
63
vulnerability VCID-qbpd-star-6fgn
64
vulnerability VCID-r7bh-7wur-xffs
65
vulnerability VCID-rmez-cwu2-2ya7
66
vulnerability VCID-s73y-y7v7-43cm
67
vulnerability VCID-sh5a-fmna-wffr
68
vulnerability VCID-sknq-8mm1-6qfe
69
vulnerability VCID-snaz-pg1h-8kew
70
vulnerability VCID-syz5-5y6f-s7er
71
vulnerability VCID-t4gn-9fw8-gkc3
72
vulnerability VCID-t753-w1ha-kqaz
73
vulnerability VCID-tmv3-fzje-sbck
74
vulnerability VCID-tz47-j4ey-t7g6
75
vulnerability VCID-v3qf-6wju-1bg8
76
vulnerability VCID-vxpj-xygq-9be2
77
vulnerability VCID-vyk2-s5ut-ubbz
78
vulnerability VCID-w8ks-xk66-r3fm
79
vulnerability VCID-wc8j-qyp4-tqbd
80
vulnerability VCID-wh98-pw9h-cyfx
81
vulnerability VCID-wrh2-77dv-hbdz
82
vulnerability VCID-wwam-tcmv-kqhc
83
vulnerability VCID-x57x-w8g8-7ybz
84
vulnerability VCID-xspf-45t1-2uhf
85
vulnerability VCID-y32p-52ps-4ug4
86
vulnerability VCID-y4x5-n5m2-x7bq
87
vulnerability VCID-yvdd-ataf-ckf1
88
vulnerability VCID-yxks-8529-23bj
89
vulnerability VCID-zxz2-xfpd-pbay
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0
aliases CVE-2014-0138
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa
61
url VCID-zxz2-xfpd-pbay
vulnerability_id VCID-zxz2-xfpd-pbay
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19714
published_at 2026-04-02T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19763
published_at 2026-04-04T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19488
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19567
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19619
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
2
reference_url https://curl.se/docs/CVE-2016-8617.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8617.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
reference_id 1388377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.51.0
purl pkg:generic/curl.se/curl@7.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-1mf9-u8y1-zbb1
2
vulnerability VCID-26ju-84rx-c7b9
3
vulnerability VCID-29n1-4u2b-tkgj
4
vulnerability VCID-2b39-ubrt-hkc6
5
vulnerability VCID-2cx5-1qnw-uufj
6
vulnerability VCID-2xmp-jc8v-bucb
7
vulnerability VCID-3sy2-4f3g-zkac
8
vulnerability VCID-47qb-2qkw-1qej
9
vulnerability VCID-56wg-yafz-gkgx
10
vulnerability VCID-5n7a-9j23-e7dj
11
vulnerability VCID-6we4-n888-6qhe
12
vulnerability VCID-6yb7-t8qs-cbch
13
vulnerability VCID-75nw-4e2d-zqgg
14
vulnerability VCID-79sv-kzb5-hbc4
15
vulnerability VCID-7srk-hshe-h3f4
16
vulnerability VCID-7vt9-pf5q-uqb6
17
vulnerability VCID-8zks-th64-33b8
18
vulnerability VCID-9ggp-5wfj-ufcq
19
vulnerability VCID-9nak-pscy-e7gs
20
vulnerability VCID-a9b6-m25r-kygw
21
vulnerability VCID-ae59-w7a1-7keg
22
vulnerability VCID-arjz-67yz-wkg9
23
vulnerability VCID-bb2f-7qrm-1kca
24
vulnerability VCID-bhvd-ntxz-dkg4
25
vulnerability VCID-bv57-gvfs-qfhj
26
vulnerability VCID-cbah-e86c-w3fj
27
vulnerability VCID-cbph-fu9d-gbah
28
vulnerability VCID-cp4n-p2z3-43b4
29
vulnerability VCID-dc3c-3wab-57gh
30
vulnerability VCID-ddgz-rczw-jqfw
31
vulnerability VCID-dgtq-eaav-jyhf
32
vulnerability VCID-etzn-uhck-h7b2
33
vulnerability VCID-fnj3-2du1-4bhx
34
vulnerability VCID-fp65-97n1-xuaj
35
vulnerability VCID-ggt7-eejg-xfb6
36
vulnerability VCID-gnx2-djyk-uyaf
37
vulnerability VCID-hj8v-tgnn-mfdw
38
vulnerability VCID-hrsy-694u-2fec
39
vulnerability VCID-hudt-78dw-tkf2
40
vulnerability VCID-j2qx-np45-4qdu
41
vulnerability VCID-jnfc-8f5d-pyh4
42
vulnerability VCID-ju6h-a1sz-f7e5
43
vulnerability VCID-mkyr-w79c-qqfz
44
vulnerability VCID-ms2r-94ph-yyh3
45
vulnerability VCID-n51k-39uk-auca
46
vulnerability VCID-ph5u-5j8n-4qah
47
vulnerability VCID-q229-ag6u-u3hv
48
vulnerability VCID-qbpd-star-6fgn
49
vulnerability VCID-qdcn-2u3v-b3cv
50
vulnerability VCID-qpfa-s6sd-8yct
51
vulnerability VCID-r7bh-7wur-xffs
52
vulnerability VCID-rmez-cwu2-2ya7
53
vulnerability VCID-s73y-y7v7-43cm
54
vulnerability VCID-sh5a-fmna-wffr
55
vulnerability VCID-syz5-5y6f-s7er
56
vulnerability VCID-t4gn-9fw8-gkc3
57
vulnerability VCID-tz47-j4ey-t7g6
58
vulnerability VCID-u4bx-xqb3-vuef
59
vulnerability VCID-v3qf-6wju-1bg8
60
vulnerability VCID-w8ks-xk66-r3fm
61
vulnerability VCID-wrh2-77dv-hbdz
62
vulnerability VCID-wwam-tcmv-kqhc
63
vulnerability VCID-x57x-w8g8-7ybz
64
vulnerability VCID-y32p-52ps-4ug4
65
vulnerability VCID-y4x5-n5m2-x7bq
66
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0
aliases CVE-2016-8617
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.17.1