{"url":"http://public2.vulnerablecode.io/api/packages/370720?format=json","purl":"pkg:generic/curl.se/curl@7.17.1","type":"generic","namespace":"curl.se","name":"curl","version":"7.17.1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"8.19.0","latest_non_vulnerable_version":"8.19.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49272?format=json","vulnerability_id":"VCID-1k8f-qgcv-xkhb","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27782","reference_id":"","reference_type":"","scores":[{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.6454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.6452","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27782"},{"reference_url":"https://curl.se/docs/CVE-2022-27782.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27782.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1555796","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1555796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082215","reference_id":"2082215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082215"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5412-1/","reference_id":"USN-5412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5412-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370827?format=json","purl":"pkg:generic/curl.se/curl@7.83.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.1"}],"aliases":["CVE-2022-27782"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49715?format=json","vulnerability_id":"VCID-26ju-84rx-c7b9","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407","reference_id":"","reference_type":"","scores":[{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51549","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407"},{"reference_url":"https://curl.se/docs/CVE-2017-7407.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-7407.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190","reference_id":"1439190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500","reference_id":"859500","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407","reference_id":"CVE-2017-7407","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370785?format=json","purl":"pkg:generic/curl.se/curl@7.54.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-u9jp-j1ds-73e7"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.54.0"}],"aliases":["CVE-2017-7407"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34392?format=json","vulnerability_id":"VCID-29n1-4u2b-tkgj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16842","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37128","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16842"},{"reference_url":"https://curl.se/docs/CVE-2018-16842.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-16842.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1644124","reference_id":"1644124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1644124"},{"reference_url":"https://security.archlinux.org/ASA-201811-4","reference_id":"ASA-201811-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-4"},{"reference_url":"https://security.archlinux.org/AVG-795","reference_id":"AVG-795","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-795"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2181","reference_id":"RHSA-2019:2181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2181"},{"reference_url":"https://usn.ubuntu.com/3805-1/","reference_id":"USN-3805-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3805-1/"},{"reference_url":"https://usn.ubuntu.com/3805-2/","reference_id":"USN-3805-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3805-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370797?format=json","purl":"pkg:generic/curl.se/curl@7.62.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ac6r-spds-qbf5"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j5s3-rr74-nqb8"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.62.0"}],"aliases":["CVE-2018-16842"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64301?format=json","vulnerability_id":"VCID-2cx5-1qnw-uufj","summary":"curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19316","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448","reference_id":"2446448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.json","reference_id":"CVE-2026-1965.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.json"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370671?format=json","purl":"pkg:generic/curl.se/curl@8.19.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0"}],"aliases":["CVE-2026-1965"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60689?format=json","vulnerability_id":"VCID-2f5z-vxsz-yqdv","summary":"A vulnerability in cURL may allow for arbitrary file access.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20090303.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20090303.html"},{"reference_url":"http://curl.haxx.se/lxr/source/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/lxr/source/CHANGES"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037","reference_id":"","reference_type":"","scores":[{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037"},{"reference_url":"https://curl.se/docs/CVE-2009-0037.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-0037.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037"},{"reference_url":"http://secunia.com/advisories/34138","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34138"},{"reference_url":"http://secunia.com/advisories/34202","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34202"},{"reference_url":"http://secunia.com/advisories/34237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34237"},{"reference_url":"http://secunia.com/advisories/34251","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34251"},{"reference_url":"http://secunia.com/advisories/34255","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34255"},{"reference_url":"http://secunia.com/advisories/34259","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34259"},{"reference_url":"http://secunia.com/advisories/34399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34399"},{"reference_url":"http://secunia.com/advisories/35766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35766"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-21.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042"},{"reference_url":"http://www.debian.org/security/2009/dsa-1738","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1738"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33962","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33962"},{"reference_url":"http://www.securitytracker.com/id?1021783","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021783"},{"reference_url":"http://www.ubuntu.com/usn/USN-726-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-726-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0581","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0581"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1865","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1865"},{"reference_url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/"},{"reference_url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271","reference_id":"485271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423","reference_id":"518423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037","reference_id":"CVE-2009-0037","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt"},{"reference_url":"https://www.securityfocus.com/bid/33962/info","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/33962/info"},{"reference_url":"https://security.gentoo.org/glsa/200903-21","reference_id":"GLSA-200903-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0341","reference_id":"RHSA-2009:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0341"},{"reference_url":"https://usn.ubuntu.com/726-1/","reference_id":"USN-726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370728?format=json","purl":"pkg:generic/curl.se/curl@7.19.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r3ny-7kn7-ukaa"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.4"}],"aliases":["CVE-2009-0037"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49279?format=json","vulnerability_id":"VCID-2xmp-jc8v-bucb","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52332","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252"},{"reference_url":"https://curl.se/docs/CVE-2022-35252.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-35252.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1613943","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://hackerone.com/reports/1613943"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831","reference_id":"1018831","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/21","reference_id":"21","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718","reference_id":"2120718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213603","reference_id":"HT213603","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213603"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220930-0005/","reference_id":"ntap-20220930-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220930-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2478","reference_id":"RHSA-2023:2478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2963","reference_id":"RHSA-2023:2963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5587-1/","reference_id":"USN-5587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370829?format=json","purl":"pkg:generic/curl.se/curl@7.85.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rg54-svzj-x7f9"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.85.0"}],"aliases":["CVE-2022-35252"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49266?format=json","vulnerability_id":"VCID-3sy2-4f3g-zkac","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774","reference_id":"","reference_type":"","scores":[{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53801","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774"},{"reference_url":"https://curl.se/docs/CVE-2022-27774.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27774.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1543773","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1543773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254","reference_id":"1010254","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547","reference_id":"2077547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370826?format=json","purl":"pkg:generic/curl.se/curl@7.83.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6ge5-86tg-dydf"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hjkx-6yep-mkde"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rhxh-77pj-1bfy"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v9n1-d6xt-6ubn"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0"}],"aliases":["CVE-2022-27774"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57268?format=json","vulnerability_id":"VCID-47qb-2qkw-1qej","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321","reference_id":"","reference_type":"","scores":[{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53037","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321"},{"reference_url":"https://curl.se/docs/CVE-2023-28321.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28321.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1950627","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://hackerone.com/reports/1950627"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786","reference_id":"2196786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4523","reference_id":"RHSA-2023:4523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28321"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51947?format=json","vulnerability_id":"VCID-4mk9-5buz-puh5","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139","reference_id":"","reference_type":"","scores":[{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139"},{"reference_url":"https://curl.se/docs/CVE-2014-0139.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0139.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149","reference_id":"1079149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370758?format=json","purl":"pkg:generic/curl.se/curl@7.36.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0"}],"aliases":["CVE-2014-0139"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=json","vulnerability_id":"VCID-6muy-xpdq-9kg8","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616","reference_id":"","reference_type":"","scores":[{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.8864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616"},{"reference_url":"https://curl.se/docs/CVE-2016-8616.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8616.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371","reference_id":"1388371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8616"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71914?format=json","vulnerability_id":"VCID-6we4-n888-6qhe","summary":"libcurl: Buffer Overflow in libcurl via zlib Integer Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63815","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63772","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.html","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2956023","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://hackerone.com/reports/2956023"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899","reference_id":"2343899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.json","reference_id":"CVE-2025-0725.json","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370854?format=json","purl":"pkg:generic/curl.se/curl@8.12.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-176a-agbw-hqdy"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9mjz-apkm-g7h1"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0"}],"aliases":["CVE-2025-0725"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49700?format=json","vulnerability_id":"VCID-6yb7-t8qs-cbch","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88238","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007"},{"reference_url":"https://curl.se/docs/CVE-2018-1000007.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000007.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125","reference_id":"1537125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125"},{"reference_url":"https://security.archlinux.org/ASA-201801-20","reference_id":"ASA-201801-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-20"},{"reference_url":"https://security.archlinux.org/ASA-201801-22","reference_id":"ASA-201801-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-22"},{"reference_url":"https://security.archlinux.org/ASA-201801-23","reference_id":"ASA-201801-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-23"},{"reference_url":"https://security.archlinux.org/ASA-201801-24","reference_id":"ASA-201801-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-24"},{"reference_url":"https://security.archlinux.org/ASA-201801-25","reference_id":"ASA-201801-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-25"},{"reference_url":"https://security.archlinux.org/ASA-201801-26","reference_id":"ASA-201801-26","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-26"},{"reference_url":"https://security.archlinux.org/AVG-593","reference_id":"AVG-593","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-593"},{"reference_url":"https://security.archlinux.org/AVG-594","reference_id":"AVG-594","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-594"},{"reference_url":"https://security.archlinux.org/AVG-595","reference_id":"AVG-595","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-595"},{"reference_url":"https://security.archlinux.org/AVG-596","reference_id":"AVG-596","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-596"},{"reference_url":"https://security.archlinux.org/AVG-597","reference_id":"AVG-597","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-597"},{"reference_url":"https://security.archlinux.org/AVG-598","reference_id":"AVG-598","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-598"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"},{"reference_url":"https://usn.ubuntu.com/3554-1/","reference_id":"USN-3554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-1/"},{"reference_url":"https://usn.ubuntu.com/3554-2/","reference_id":"USN-3554-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370792?format=json","purl":"pkg:generic/curl.se/curl@7.58.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.58.0"}],"aliases":["CVE-2018-1000007"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80714?format=json","vulnerability_id":"VCID-7c8e-eaqy-akeu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153","reference_id":"","reference_type":"","scores":[{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92922","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92941","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153"},{"reference_url":"https://curl.se/docs/CVE-2015-3153.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3153.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341","reference_id":"1217341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370766?format=json","purl":"pkg:generic/curl.se/curl@7.42.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.1"}],"aliases":["CVE-2015-3153"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16993?format=json","vulnerability_id":"VCID-7srk-hshe-h3f4","summary":"Improper Authentication\nAn authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27538","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27538"},{"reference_url":"https://curl.se/docs/CVE-2023-27538.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27538.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1898475","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://hackerone.com/reports/1898475"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179103","reference_id":"2179103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179103"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27538","reference_id":"CVE-2023-27538","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27538"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0010/","reference_id":"ntap-20230420-0010","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370834?format=json","purl":"pkg:generic/curl.se/curl@8.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0"}],"aliases":["CVE-2023-27538"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34691?format=json","vulnerability_id":"VCID-7xxh-66ys-4bhw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419","reference_id":"","reference_type":"","scores":[{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419"},{"reference_url":"https://curl.se/docs/CVE-2016-5419.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5419.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183","reference_id":"1362183","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370777?format=json","purl":"pkg:generic/curl.se/curl@7.50.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1"}],"aliases":["CVE-2016-5419"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64299?format=json","vulnerability_id":"VCID-8zks-th64-33b8","summary":"curl: curl: Unauthorized access due to improper HTTP proxy connection reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03709","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3584903","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://hackerone.com/reports/3584903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449","reference_id":"2446449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.json","reference_id":"CVE-2026-3784.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.json"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370671?format=json","purl":"pkg:generic/curl.se/curl@8.19.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0"}],"aliases":["CVE-2026-3784"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57259?format=json","vulnerability_id":"VCID-9ggp-5wfj-ufcq","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43552","reference_id":"","reference_type":"","scores":[{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42409","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4244","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43552"},{"reference_url":"https://curl.se/docs/CVE-2022-43552.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-43552.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1764858","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://hackerone.com/reports/1764858"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830","reference_id":"1026830","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Mar/17","reference_id":"17","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Mar/17"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152652","reference_id":"2152652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152652"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://support.apple.com/kb/HT213670"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230214-0002/","reference_id":"ntap-20230214-0002","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230214-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2478","reference_id":"RHSA-2023:2478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2963","reference_id":"RHSA-2023:2963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7743","reference_id":"RHSA-2023:7743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5788-1/","reference_id":"USN-5788-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5788-1/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370831?format=json","purl":"pkg:generic/curl.se/curl@7.87.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.87.0"}],"aliases":["CVE-2022-43552"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49278?format=json","vulnerability_id":"VCID-9nak-pscy-e7gs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221","reference_id":"","reference_type":"","scores":[{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.8553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85988","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221"},{"reference_url":"https://curl.se/docs/CVE-2022-32221.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32221.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1704017","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://hackerone.com/reports/1704017"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411","reference_id":"2135411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/17/4","reference_id":"4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/17/4"},{"reference_url":"https://www.debian.org/security/2023/dsa-5330","reference_id":"dsa-5330","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://www.debian.org/security/2023/dsa-5330"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230110-0006/","reference_id":"ntap-20230110-0006","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230110-0006/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230208-0002/","reference_id":"ntap-20230208-0002","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230208-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0333","reference_id":"RHSA-2023:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4139","reference_id":"RHSA-2023:4139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4139"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"},{"reference_url":"https://usn.ubuntu.com/5702-2/","reference_id":"USN-5702-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-2/"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370830?format=json","purl":"pkg:generic/curl.se/curl@7.86.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.86.0"}],"aliases":["CVE-2022-32221"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59713?format=json","vulnerability_id":"VCID-ae59-w7a1-7keg","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80043","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80089","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254"},{"reference_url":"https://curl.haxx.se/673d0cd8.patch","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/673d0cd8.patch"},{"reference_url":"https://curl.haxx.se/docs/adv_20171004.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20171004.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000254.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000254.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://support.apple.com/HT208331","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208331"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/101115","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101115"},{"reference_url":"http://www.securitytracker.com/id/1039509","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541","reference_id":"1495541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671","reference_id":"877671","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671"},{"reference_url":"https://security.archlinux.org/ASA-201710-2","reference_id":"ASA-201710-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-2"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://security.archlinux.org/AVG-422","reference_id":"AVG-422","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-422"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254","reference_id":"CVE-2017-1000254","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370789?format=json","purl":"pkg:generic/curl.se/curl@7.56.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-drkp-q9r5-ukcm"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.56.0"}],"aliases":["CVE-2017-1000254"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57263?format=json","vulnerability_id":"VCID-arjz-67yz-wkg9","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40434","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533"},{"reference_url":"https://curl.se/docs/CVE-2023-27533.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27533.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1891474","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://hackerone.com/reports/1891474"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062","reference_id":"2179062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0011/","reference_id":"ntap-20230420-0011","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370834?format=json","purl":"pkg:generic/curl.se/curl@8.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0"}],"aliases":["CVE-2023-27533"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34689?format=json","vulnerability_id":"VCID-b2ef-zj3u-rbhy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127A.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html"},{"reference_url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61463","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755"},{"reference_url":"https://curl.se/docs/CVE-2016-0755.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0755.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755"},{"reference_url":"https://support.apple.com/HT207170","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT207170"},{"reference_url":"http://www.debian.org/security/2016/dsa-3455","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3455"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/82307","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82307"},{"reference_url":"http://www.securitytracker.com/id/1034882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034882"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965"},{"reference_url":"http://www.ubuntu.com/usn/USN-2882-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2882-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263","reference_id":"1302263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755","reference_id":"CVE-2016-0755","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/2882-1/","reference_id":"USN-2882-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370771?format=json","purl":"pkg:generic/curl.se/curl@7.47.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0"}],"aliases":["CVE-2016-0755"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56000?format=json","vulnerability_id":"VCID-c2na-7q9e-47am","summary":"information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015","reference_id":"","reference_type":"","scores":[{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80415","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015"},{"reference_url":"https://curl.se/docs/CVE-2014-0015.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0015.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903","reference_id":"1053903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2097-1/","reference_id":"USN-2097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2097-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370757?format=json","purl":"pkg:generic/curl.se/curl@7.35.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.35.0"}],"aliases":["CVE-2014-0015"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=json","vulnerability_id":"VCID-c6dk-7gj6-7far","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623"},{"reference_url":"https://curl.se/docs/CVE-2016-8623.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8623.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388","reference_id":"1388388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16997?format=json","vulnerability_id":"VCID-cbah-e86c-w3fj","summary":"Improper Authentication\nAn authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27535","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20295","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27535"},{"reference_url":"https://curl.se/docs/CVE-2023-27535.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27535.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1892780","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://hackerone.com/reports/1892780"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179073","reference_id":"2179073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179073"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27535","reference_id":"CVE-2023-27535","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27535"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0010/","reference_id":"ntap-20230420-0010","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2650","reference_id":"RHSA-2023:2650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3106","reference_id":"RHSA-2023:3106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370834?format=json","purl":"pkg:generic/curl.se/curl@8.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0"}],"aliases":["CVE-2023-27535"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57267?format=json","vulnerability_id":"VCID-ddgz-rczw-jqfw","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67579","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320"},{"reference_url":"https://curl.se/docs/CVE-2023-28320.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28320.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1929597","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://hackerone.com/reports/1929597"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783","reference_id":"2196783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28320"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15716?format=json","vulnerability_id":"VCID-dgtq-eaav-jyhf","summary":"Out-of-bounds Write\nA buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3157","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1543","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:1543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0544","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0594","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81312","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000120"},{"reference_url":"https://curl.haxx.se/docs/adv_2018-9cd6.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://curl.haxx.se/docs/adv_2018-9cd6.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/coapp-packages/curl","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/coapp-packages/curl"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html"},{"reference_url":"https://usn.ubuntu.com/3598-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3598-1"},{"reference_url":"https://usn.ubuntu.com/3598-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3598-1/"},{"reference_url":"https://usn.ubuntu.com/3598-2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3598-2"},{"reference_url":"https://usn.ubuntu.com/3598-2/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3598-2/"},{"reference_url":"https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531"},{"reference_url":"https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414"},{"reference_url":"https://www.debian.org/security/2018/dsa-4136","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2018/dsa-4136"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552628","reference_id":"1552628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546","reference_id":"893546","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"},{"reference_url":"https://security.archlinux.org/ASA-201803-15","reference_id":"ASA-201803-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-15"},{"reference_url":"https://security.archlinux.org/ASA-201803-16","reference_id":"ASA-201803-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-16"},{"reference_url":"https://security.archlinux.org/ASA-201803-17","reference_id":"ASA-201803-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-17"},{"reference_url":"https://security.archlinux.org/ASA-201803-18","reference_id":"ASA-201803-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-18"},{"reference_url":"https://security.archlinux.org/ASA-201803-19","reference_id":"ASA-201803-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-19"},{"reference_url":"https://security.archlinux.org/ASA-201803-20","reference_id":"ASA-201803-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-20"},{"reference_url":"https://security.archlinux.org/AVG-653","reference_id":"AVG-653","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-653"},{"reference_url":"https://security.archlinux.org/AVG-654","reference_id":"AVG-654","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-654"},{"reference_url":"https://security.archlinux.org/AVG-655","reference_id":"AVG-655","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-655"},{"reference_url":"https://security.archlinux.org/AVG-656","reference_id":"AVG-656","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-656"},{"reference_url":"https://security.archlinux.org/AVG-660","reference_id":"AVG-660","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-660"},{"reference_url":"https://security.archlinux.org/AVG-661","reference_id":"AVG-661","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-661"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000120","reference_id":"CVE-2018-1000120","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"},{"reference_url":"https://curl.se/docs/CVE-2018-1000120.html","reference_id":"CVE-2018-1000120.HTML","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000120.html"},{"reference_url":"https://github.com/advisories/GHSA-674j-7m97-j2p9","reference_id":"GHSA-674j-7m97-j2p9","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-674j-7m97-j2p9"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370793?format=json","purl":"pkg:generic/curl.se/curl@7.59.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9cbd-x468-rkaw"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.59.0"}],"aliases":["CVE-2018-1000120","GHSA-674j-7m97-j2p9"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46646?format=json","vulnerability_id":"VCID-dj5e-62rt-hkex","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734","reference_id":"","reference_type":"","scores":[{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.8941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89453","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734"},{"reference_url":"https://curl.se/docs/CVE-2010-0734.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2010-0734.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220","reference_id":"563220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0273","reference_id":"RHSA-2010:0273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0329","reference_id":"RHSA-2010:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0329"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370732?format=json","purl":"pkg:generic/curl.se/curl@7.20.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mcy-vzmg-mbhz"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-m3nh-aha9-dfbc"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.20.0"}],"aliases":["CVE-2010-0734"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34687?format=json","vulnerability_id":"VCID-dzzd-afgu-3fcy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150","reference_id":"","reference_type":"","scores":[{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150"},{"reference_url":"https://curl.se/docs/CVE-2014-8150.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-8150.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692","reference_id":"1178692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2474-1/","reference_id":"USN-2474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2474-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370763?format=json","purl":"pkg:generic/curl.se/curl@7.40.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qka4-jfdb-w3d5"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.40.0"}],"aliases":["CVE-2014-8150"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40939?format=json","vulnerability_id":"VCID-e1yx-dxa6-1bba","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389","reference_id":"","reference_type":"","scores":[{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88165","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389"},{"reference_url":"https://curl.se/docs/CVE-2011-3389.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-3389.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506","reference_id":"737506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506"},{"reference_url":"https://security.gentoo.org/glsa/201111-02","reference_id":"GLSA-201111-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-02"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1380","reference_id":"RHSA-2011:1380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1384","reference_id":"RHSA-2011:1384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0006","reference_id":"RHSA-2012:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0034","reference_id":"RHSA-2012:0034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0343","reference_id":"RHSA-2012:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0508","reference_id":"RHSA-2012:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://usn.ubuntu.com/1263-1/","reference_id":"USN-1263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1263-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370745?format=json","purl":"pkg:generic/curl.se/curl@7.24.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.24.0"}],"aliases":["CVE-2011-3389"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=json","vulnerability_id":"VCID-e58m-g37d-9fd6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624","reference_id":"","reference_type":"","scores":[{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624"},{"reference_url":"https://curl.se/docs/CVE-2016-8624.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8624.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390","reference_id":"1388390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57774?format=json","vulnerability_id":"VCID-eer3-29q8-sbgq","summary":"security update","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20141105.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20141105.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3707","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43384","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3707"},{"reference_url":"https://curl.se/docs/CVE-2014-3707.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3707.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3069","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3069"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/70988","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70988"},{"reference_url":"http://www.ubuntu.com/usn/USN-2399-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2399-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1154941","reference_id":"1154941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1154941"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3707","reference_id":"CVE-2014-3707","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2399-1/","reference_id":"USN-2399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370762?format=json","purl":"pkg:generic/curl.se/curl@7.39.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qka4-jfdb-w3d5"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.39.0"}],"aliases":["CVE-2014-3707"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46647?format=json","vulnerability_id":"VCID-exhe-cmqf-duad","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192","reference_id":"","reference_type":"","scores":[{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192"},{"reference_url":"https://curl.se/docs/CVE-2011-2192.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-2192.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615","reference_id":"631615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454","reference_id":"711454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0918","reference_id":"RHSA-2011:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0918"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370741?format=json","purl":"pkg:generic/curl.se/curl@7.21.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mcy-vzmg-mbhz"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.21.7"}],"aliases":["CVE-2011-2192"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34707?format=json","vulnerability_id":"VCID-fnj3-2du1-4bhx","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586","reference_id":"","reference_type":"","scores":[{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75557","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586"},{"reference_url":"https://curl.haxx.se/docs/adv_20161221A.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20161221A.html"},{"reference_url":"https://curl.se/docs/CVE-2016-9586.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9586.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/95019","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95019"},{"reference_url":"http://www.securitytracker.com/id/1037515","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037515"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712","reference_id":"1406712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958","reference_id":"848958","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958"},{"reference_url":"https://security.archlinux.org/ASA-201612-22","reference_id":"ASA-201612-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-22"},{"reference_url":"https://security.archlinux.org/ASA-201701-10","reference_id":"ASA-201701-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-10"},{"reference_url":"https://security.archlinux.org/ASA-201701-11","reference_id":"ASA-201701-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-11"},{"reference_url":"https://security.archlinux.org/ASA-201701-7","reference_id":"ASA-201701-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-7"},{"reference_url":"https://security.archlinux.org/ASA-201701-8","reference_id":"ASA-201701-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-8"},{"reference_url":"https://security.archlinux.org/ASA-201701-9","reference_id":"ASA-201701-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-9"},{"reference_url":"https://security.archlinux.org/AVG-112","reference_id":"AVG-112","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-112"},{"reference_url":"https://security.archlinux.org/AVG-113","reference_id":"AVG-113","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-113"},{"reference_url":"https://security.archlinux.org/AVG-114","reference_id":"AVG-114","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-114"},{"reference_url":"https://security.archlinux.org/AVG-115","reference_id":"AVG-115","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-115"},{"reference_url":"https://security.archlinux.org/AVG-116","reference_id":"AVG-116","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-116"},{"reference_url":"https://security.archlinux.org/AVG-117","reference_id":"AVG-117","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-117"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586","reference_id":"CVE-2016-9586","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370781?format=json","purl":"pkg:generic/curl.se/curl@7.52.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-36n6-qanf-nue8"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-hyqp-z8hb-fqbt"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-q3hu-8uy5-e3a4"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.52.0"}],"aliases":["CVE-2016-9586"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49713?format=json","vulnerability_id":"VCID-fp65-97n1-xuaj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76506","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000100"},{"reference_url":"https://curl.haxx.se/docs/adv_20170809B.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20170809B.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000100.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000100.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208221","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208221"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/100286","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100286"},{"reference_url":"http://www.securitytracker.com/id/1039118","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039118"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478310","reference_id":"1478310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478310"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555","reference_id":"871555","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555"},{"reference_url":"https://security.archlinux.org/ASA-201708-16","reference_id":"ASA-201708-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-16"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-370","reference_id":"AVG-370","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-370"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000100","reference_id":"CVE-2017-1000100","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000100"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370787?format=json","purl":"pkg:generic/curl.se/curl@7.55.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.55.0"}],"aliases":["CVE-2017-1000100"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61667?format=json","vulnerability_id":"VCID-ggt7-eejg-xfb6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876"},{"reference_url":"https://curl.se/docs/CVE-2021-22876.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://curl.se/docs/CVE-2021-22876.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1101882","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://hackerone.com/reports/1101882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964","reference_id":"1941964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/","reference_id":"2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269","reference_id":"986269","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269"},{"reference_url":"https://security.archlinux.org/AVG-1753","reference_id":"AVG-1753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1753"},{"reference_url":"https://security.archlinux.org/AVG-1754","reference_id":"AVG-1754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1754"},{"reference_url":"https://security.archlinux.org/AVG-1755","reference_id":"AVG-1755","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1755"},{"reference_url":"https://security.archlinux.org/AVG-1756","reference_id":"AVG-1756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1756"},{"reference_url":"https://security.archlinux.org/AVG-1757","reference_id":"AVG-1757","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1757"},{"reference_url":"https://security.archlinux.org/AVG-1758","reference_id":"AVG-1758","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1758"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876","reference_id":"CVE-2021-22876","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/","reference_id":"ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/","reference_id":"KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210521-0007/","reference_id":"ntap-20210521-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210521-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://usn.ubuntu.com/4898-1/","reference_id":"USN-4898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4898-1/"},{"reference_url":"https://usn.ubuntu.com/4903-1/","reference_id":"USN-4903-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4903-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370817?format=json","purl":"pkg:generic/curl.se/curl@7.76.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-38mv-usbe-z7hd"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.76.0"}],"aliases":["CVE-2021-22876"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19507?format=json","vulnerability_id":"VCID-gnx2-djyk-uyaf","summary":"Cookie injection with none file\nThis flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle does not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49012","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2148242","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/2148242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938","reference_id":"2241938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/37","reference_id":"37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/38","reference_id":"38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/38"},{"reference_url":"https://security.archlinux.org/AVG-2845","reference_id":"AVG-2845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2845"},{"reference_url":"https://security.archlinux.org/AVG-2846","reference_id":"AVG-2846","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2846"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546","reference_id":"CVE-2023-38546","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546"},{"reference_url":"https://curl.se/docs/CVE-2023-38546.html","reference_id":"CVE-2023-38546.HTML","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://curl.se/docs/CVE-2023-38546.html"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214057","reference_id":"HT214057","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214057"},{"reference_url":"https://support.apple.com/kb/HT214058","reference_id":"HT214058","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214058"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","reference_id":"OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5700","reference_id":"RHSA-2023:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5763","reference_id":"RHSA-2023:5763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6745","reference_id":"RHSA-2023:6745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7540","reference_id":"RHSA-2023:7540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7625","reference_id":"RHSA-2023:7625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7626","reference_id":"RHSA-2023:7626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2101","reference_id":"RHSA-2024:2101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2101"},{"reference_url":"https://usn.ubuntu.com/6429-1/","reference_id":"USN-6429-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-1/"},{"reference_url":"https://usn.ubuntu.com/6429-2/","reference_id":"USN-6429-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-2/"},{"reference_url":"https://usn.ubuntu.com/6429-3/","reference_id":"USN-6429-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-3/"},{"reference_url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","reference_id":"viewtopic.php?f=8&t=8868","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370842?format=json","purl":"pkg:generic/curl.se/curl@8.4.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0"}],"aliases":["CVE-2023-38546"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49261?format=json","vulnerability_id":"VCID-hudt-78dw-tkf2","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62194","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925"},{"reference_url":"https://curl.se/docs/CVE-2021-22925.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22925.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223882","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1223882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902","reference_id":"1970902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370820?format=json","purl":"pkg:generic/curl.se/curl@7.78.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0"}],"aliases":["CVE-2021-22925"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34692?format=json","vulnerability_id":"VCID-jeqg-g3en-5udw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420","reference_id":"","reference_type":"","scores":[{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77896","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420"},{"reference_url":"https://curl.se/docs/CVE-2016-5420.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5420.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190","reference_id":"1362190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370777?format=json","purl":"pkg:generic/curl.se/curl@7.50.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1"}],"aliases":["CVE-2016-5420"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=json","vulnerability_id":"VCID-jqqf-gmd3-ubcd","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621","reference_id":"","reference_type":"","scores":[{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.8458","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84622","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621"},{"reference_url":"https://curl.se/docs/CVE-2016-8621.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8621.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385","reference_id":"1388385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8621"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=json","vulnerability_id":"VCID-jtw4-af4y-nkbk","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619","reference_id":"","reference_type":"","scores":[{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8643","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619"},{"reference_url":"https://curl.se/docs/CVE-2016-8619.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8619.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379","reference_id":"1388379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8619"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34695?format=json","vulnerability_id":"VCID-k8kj-q1je-f7bt","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167","reference_id":"","reference_type":"","scores":[{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84704","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.8471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84667","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167"},{"reference_url":"https://curl.se/docs/CVE-2016-7167.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-7167.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906","reference_id":"1375906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945","reference_id":"837945","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945"},{"reference_url":"https://security.archlinux.org/ASA-201609-18","reference_id":"ASA-201609-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-18"},{"reference_url":"https://security.archlinux.org/ASA-201609-19","reference_id":"ASA-201609-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-19"},{"reference_url":"https://security.archlinux.org/AVG-20","reference_id":"AVG-20","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-20"},{"reference_url":"https://security.archlinux.org/AVG-21","reference_id":"AVG-21","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-21"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2016","reference_id":"RHSA-2017:2016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2016"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370779?format=json","purl":"pkg:generic/curl.se/curl@7.50.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.3"}],"aliases":["CVE-2016-7167"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65185?format=json","vulnerability_id":"VCID-mkyr-w79c-qqfz","summary":"curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14017","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00583","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.006","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00593","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00595","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00587","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00586","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00582","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14017"},{"reference_url":"https://curl.se/docs/CVE-2025-14017.html","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"}],"url":"https://curl.se/docs/CVE-2025-14017.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427870","reference_id":"2427870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427870"},{"reference_url":"https://curl.se/docs/CVE-2025-14017.json","reference_id":"CVE-2025-14017.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"}],"url":"https://curl.se/docs/CVE-2025-14017.json"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"},{"reference_url":"https://usn.ubuntu.com/8062-2/","reference_id":"USN-8062-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370670?format=json","purl":"pkg:generic/curl.se/curl@8.18.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-etzn-uhck-h7b2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0"}],"aliases":["CVE-2025-14017"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61669?format=json","vulnerability_id":"VCID-ph5u-5j8n-4qah","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31806","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31977","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31843","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898"},{"reference_url":"https://curl.se/docs/CVE-2021-22898.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22898.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1176461","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1176461"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887","reference_id":"1964887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228","reference_id":"989228","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228"},{"reference_url":"https://security.archlinux.org/ASA-202106-4","reference_id":"ASA-202106-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-4"},{"reference_url":"https://security.archlinux.org/ASA-202106-5","reference_id":"ASA-202106-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-5"},{"reference_url":"https://security.archlinux.org/ASA-202106-6","reference_id":"ASA-202106-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-6"},{"reference_url":"https://security.archlinux.org/ASA-202106-7","reference_id":"ASA-202106-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-7"},{"reference_url":"https://security.archlinux.org/ASA-202106-8","reference_id":"ASA-202106-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-8"},{"reference_url":"https://security.archlinux.org/ASA-202106-9","reference_id":"ASA-202106-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-9"},{"reference_url":"https://security.archlinux.org/AVG-1995","reference_id":"AVG-1995","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1995"},{"reference_url":"https://security.archlinux.org/AVG-1996","reference_id":"AVG-1996","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1996"},{"reference_url":"https://security.archlinux.org/AVG-1997","reference_id":"AVG-1997","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1997"},{"reference_url":"https://security.archlinux.org/AVG-1998","reference_id":"AVG-1998","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1998"},{"reference_url":"https://security.archlinux.org/AVG-1999","reference_id":"AVG-1999","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1999"},{"reference_url":"https://security.archlinux.org/AVG-2000","reference_id":"AVG-2000","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2000"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370819?format=json","purl":"pkg:generic/curl.se/curl@7.77.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.77.0"}],"aliases":["CVE-2021-22898"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41495?format=json","vulnerability_id":"VCID-prff-34kh-kbat","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20130412.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20130412.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944","reference_id":"","reference_type":"","scores":[{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944"},{"reference_url":"https://curl.se/docs/CVE-2013-1944.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-1944.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944"},{"reference_url":"http://secunia.com/advisories/53044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53044"},{"reference_url":"http://secunia.com/advisories/53051","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53051"},{"reference_url":"http://secunia.com/advisories/53097","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53097"},{"reference_url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"},{"reference_url":"http://www.debian.org/security/2012/dsa-2660","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2660"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.osvdb.org/92316","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/92316"},{"reference_url":"http://www.securityfocus.com/bid/59058","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/59058"},{"reference_url":"http://www.ubuntu.com/usn/USN-1801-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1801-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274","reference_id":"705274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577","reference_id":"950577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944","reference_id":"CVE-2013-1944","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0771","reference_id":"RHSA-2013:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0771"},{"reference_url":"https://usn.ubuntu.com/1801-1/","reference_id":"USN-1801-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1801-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370752?format=json","purl":"pkg:generic/curl.se/curl@7.30.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.30.0"}],"aliases":["CVE-2013-1944"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36349?format=json","vulnerability_id":"VCID-r3ny-7kn7-ukaa","summary":"An error in the X.509 certificate handling of cURL might enable remote\n    attackers to conduct man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417","reference_id":"","reference_type":"","scores":[{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91653","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417"},{"reference_url":"https://curl.se/docs/CVE-2009-2417.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-2417.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181","reference_id":"516181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991","reference_id":"541991","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991"},{"reference_url":"https://security.gentoo.org/glsa/200909-20","reference_id":"GLSA-200909-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200909-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1209","reference_id":"RHSA-2009:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1209"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"},{"reference_url":"https://usn.ubuntu.com/818-1/","reference_id":"USN-818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370730?format=json","purl":"pkg:generic/curl.se/curl@7.19.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.6"}],"aliases":["CVE-2009-2417"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49268?format=json","vulnerability_id":"VCID-r7bh-7wur-xffs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776","reference_id":"","reference_type":"","scores":[{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776"},{"reference_url":"https://curl.se/docs/CVE-2022-27776.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27776.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1547048","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://hackerone.com/reports/1547048"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252","reference_id":"1010252","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408","reference_id":"2078408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/","reference_id":"7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/","reference_id":"DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370826?format=json","purl":"pkg:generic/curl.se/curl@7.83.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6ge5-86tg-dydf"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hjkx-6yep-mkde"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rhxh-77pj-1bfy"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v9n1-d6xt-6ubn"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0"}],"aliases":["CVE-2022-27776"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50087?format=json","vulnerability_id":"VCID-rmez-cwu2-2ya7","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28391","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284"},{"reference_url":"https://curl.se/docs/CVE-2020-8284.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2020-8284.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1040166","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1040166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667","reference_id":"1902667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163","reference_id":"977163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163"},{"reference_url":"https://security.archlinux.org/AVG-1337","reference_id":"AVG-1337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1337"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"},{"reference_url":"https://usn.ubuntu.com/4665-2/","reference_id":"USN-4665-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370815?format=json","purl":"pkg:generic/curl.se/curl@7.74.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-frgg-29yv-dyf7"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0"}],"aliases":["CVE-2020-8284"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57269?format=json","vulnerability_id":"VCID-s73y-y7v7-43cm","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322"},{"reference_url":"https://curl.se/docs/CVE-2023-28322.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28322.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1954658","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://hackerone.com/reports/1954658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793","reference_id":"2196793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0585","reference_id":"RHSA-2024:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28322"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57750?format=json","vulnerability_id":"VCID-sknq-8mm1-6qfe","summary":"security update","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20140910A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20140910A.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613","reference_id":"","reference_type":"","scores":[{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82874","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613"},{"reference_url":"https://curl.se/docs/CVE-2014-3613.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3613.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3022","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3022"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/69748","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154","reference_id":"1136154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613","reference_id":"CVE-2014-3613","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2346-1/","reference_id":"USN-2346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2346-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370761?format=json","purl":"pkg:generic/curl.se/curl@7.38.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qka4-jfdb-w3d5"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.38.0"}],"aliases":["CVE-2014-3613"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/158821?format=json","vulnerability_id":"VCID-snaz-pg1h-8kew","summary":"cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127B.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127B.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5756","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754"},{"reference_url":"https://curl.se/docs/CVE-2016-0754.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0754.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754","reference_id":"CVE-2016-0754","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370771?format=json","purl":"pkg:generic/curl.se/curl@7.47.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0"}],"aliases":["CVE-2016-0754"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39487?format=json","vulnerability_id":"VCID-tmv3-fzje-sbck","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148","reference_id":"","reference_type":"","scores":[{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82137","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.8215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82214","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148"},{"reference_url":"https://curl.se/docs/CVE-2015-3148.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3148.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351","reference_id":"1213351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370765?format=json","purl":"pkg:generic/curl.se/curl@7.42.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0"}],"aliases":["CVE-2015-3148"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34388?format=json","vulnerability_id":"VCID-tz47-j4ey-t7g6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14618","reference_id":"","reference_type":"","scores":[{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.6946","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14618"},{"reference_url":"https://curl.se/docs/CVE-2018-14618.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-14618.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622707","reference_id":"1622707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622707"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327","reference_id":"908327","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1880","reference_id":"RHSA-2019:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1880"},{"reference_url":"https://usn.ubuntu.com/3765-1/","reference_id":"USN-3765-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3765-1/"},{"reference_url":"https://usn.ubuntu.com/3765-2/","reference_id":"USN-3765-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3765-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370796?format=json","purl":"pkg:generic/curl.se/curl@7.61.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9cbd-x468-rkaw"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.61.1"}],"aliases":["CVE-2018-14618"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=json","vulnerability_id":"VCID-vxpj-xygq-9be2","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615","reference_id":"","reference_type":"","scores":[{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615"},{"reference_url":"https://curl.se/docs/CVE-2016-8615.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8615.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370","reference_id":"1388370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8615"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=json","vulnerability_id":"VCID-vyk2-s5ut-ubbz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618","reference_id":"","reference_type":"","scores":[{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.8204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81978","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618"},{"reference_url":"https://curl.se/docs/CVE-2016-8618.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8618.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378","reference_id":"1388378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8618"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/161813?format=json","vulnerability_id":"VCID-wc8j-qyp4-tqbd","summary":"Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69807","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802"},{"reference_url":"https://curl.haxx.se/docs/adv_20160530.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20160530.html"},{"reference_url":"https://curl.se/docs/CVE-2016-4802.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-4802.html"},{"reference_url":"http://www.securityfocus.com/bid/90997","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90997"},{"reference_url":"http://www.securitytracker.com/id/1036008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036008"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802","reference_id":"CVE-2016-4802","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370775?format=json","purl":"pkg:generic/curl.se/curl@7.49.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.49.1"}],"aliases":["CVE-2016-4802"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39484?format=json","vulnerability_id":"VCID-xspf-45t1-2uhf","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143","reference_id":"","reference_type":"","scores":[{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.8751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87559","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143"},{"reference_url":"https://curl.se/docs/CVE-2015-3143.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3143.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306","reference_id":"1213306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370765?format=json","purl":"pkg:generic/curl.se/curl@7.42.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0"}],"aliases":["CVE-2015-3143"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11000?format=json","vulnerability_id":"VCID-y32p-52ps-4ug4","summary":"Use of Incorrectly-Resolved Name or Reference\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924","reference_id":"","reference_type":"","scores":[{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73016","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924"},{"reference_url":"https://curl.se/docs/CVE-2021-22924.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22924.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223565","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://hackerone.com/reports/1223565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460","reference_id":"1981460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492","reference_id":"991492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924","reference_id":"CVE-2021-22924","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3582","reference_id":"RHSA-2021:3582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf","reference_id":"ssa-732250.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370820?format=json","purl":"pkg:generic/curl.se/curl@7.78.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0"}],"aliases":["CVE-2021-22924"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49277?format=json","vulnerability_id":"VCID-y4x5-n5m2-x7bq","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32208","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37862","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32208"},{"reference_url":"https://curl.se/docs/CVE-2022-32208.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32208.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1590071","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://hackerone.com/reports/1590071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099306","reference_id":"2099306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099306"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://security.archlinux.org/AVG-2817","reference_id":"AVG-2817","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2817"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/","reference_id":"BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://support.apple.com/kb/HT213488"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0003/","reference_id":"ntap-20220915-0003","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6157","reference_id":"RHSA-2022:6157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6159","reference_id":"RHSA-2022:6159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5495-1/","reference_id":"USN-5495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5495-1/"},{"reference_url":"https://usn.ubuntu.com/5499-1/","reference_id":"USN-5499-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5499-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370828?format=json","purl":"pkg:generic/curl.se/curl@7.84.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rg54-svzj-x7f9"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.84.0"}],"aliases":["CVE-2022-32208"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=json","vulnerability_id":"VCID-yxks-8529-23bj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8125","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625"},{"reference_url":"https://curl.se/docs/CVE-2016-8625.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8625.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392","reference_id":"1388392","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8625"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41496?format=json","vulnerability_id":"VCID-z49y-v1gh-h7gj","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174","reference_id":"","reference_type":"","scores":[{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174"},{"reference_url":"https://curl.se/docs/CVE-2013-2174.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-2174.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640","reference_id":"965640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0983","reference_id":"RHSA-2013:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0983"},{"reference_url":"https://usn.ubuntu.com/1894-1/","reference_id":"USN-1894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370753?format=json","purl":"pkg:generic/curl.se/curl@7.31.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.31.0"}],"aliases":["CVE-2013-2174"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51946?format=json","vulnerability_id":"VCID-z8h3-fdj8-xuaa","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138","reference_id":"","reference_type":"","scores":[{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7149","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138"},{"reference_url":"https://curl.se/docs/CVE-2014-0138.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0138.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148","reference_id":"1079148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370758?format=json","purl":"pkg:generic/curl.se/curl@7.36.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0"}],"aliases":["CVE-2014-0138"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=json","vulnerability_id":"VCID-zxz2-xfpd-pbay","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617"},{"reference_url":"https://curl.se/docs/CVE-2016-8617.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8617.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377","reference_id":"1388377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8617"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.17.1"}