Lookup for vulnerable packages by Package URL.

Purlpkg:generic/curl.se/curl@7.61.1
Typegeneric
Namespacecurl.se
Namecurl
Version7.61.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8.19.0
Latest_non_vulnerable_version8.19.0
Affected_by_vulnerabilities
0
url VCID-1k8f-qgcv-xkhb
vulnerability_id VCID-1k8f-qgcv-xkhb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64512
published_at 2026-04-13T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.64536
published_at 2026-04-09T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.64552
published_at 2026-04-11T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-12T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64484
published_at 2026-04-02T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64515
published_at 2026-04-04T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-07T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
2
reference_url https://curl.se/docs/CVE-2022-27782.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27782.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1555796
reference_id
reference_type
scores
url https://hackerone.com/reports/1555796
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
reference_id 2082215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
21
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
22
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
23
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
24
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
25
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.1
purl pkg:generic/curl.se/curl@7.83.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-9nak-pscy-e7gs
11
vulnerability VCID-arjz-67yz-wkg9
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-ej47-4dcu-5fhy
15
vulnerability VCID-etzn-uhck-h7b2
16
vulnerability VCID-gnx2-djyk-uyaf
17
vulnerability VCID-gv7x-j8bz-wycc
18
vulnerability VCID-hrsy-694u-2fec
19
vulnerability VCID-m15r-v9sr-2bbn
20
vulnerability VCID-mkyr-w79c-qqfz
21
vulnerability VCID-ms2r-94ph-yyh3
22
vulnerability VCID-n57n-cymy-z7dr
23
vulnerability VCID-nvzd-v3bs-6qek
24
vulnerability VCID-pwn6-j8vf-rufk
25
vulnerability VCID-qdcn-2u3v-b3cv
26
vulnerability VCID-qpux-jh6k-8qhx
27
vulnerability VCID-s73y-y7v7-43cm
28
vulnerability VCID-syz5-5y6f-s7er
29
vulnerability VCID-t1fk-cbsx-j3gh
30
vulnerability VCID-t9p4-2x7v-yfaq
31
vulnerability VCID-tcqe-7skm-b3fz
32
vulnerability VCID-u4bx-xqb3-vuef
33
vulnerability VCID-vbbv-k1r7-kkas
34
vulnerability VCID-wgma-bycg-1qb1
35
vulnerability VCID-x57x-w8g8-7ybz
36
vulnerability VCID-xpss-yndr-mycj
37
vulnerability VCID-xzay-sjpy-3yce
38
vulnerability VCID-y4x5-n5m2-x7bq
39
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.1
aliases CVE-2022-27782
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb
1
url VCID-29n1-4u2b-tkgj
vulnerability_id VCID-29n1-4u2b-tkgj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31838
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32009
published_at 2026-04-04T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31967
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31828
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31909
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-13T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
2
reference_url https://curl.se/docs/CVE-2018-16842.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16842.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
reference_id 1644124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
7
reference_url https://security.archlinux.org/ASA-201811-4
reference_id ASA-201811-4
reference_type
scores
url https://security.archlinux.org/ASA-201811-4
8
reference_url https://security.archlinux.org/AVG-795
reference_id AVG-795
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-795
9
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
10
reference_url https://access.redhat.com/errata/RHSA-2019:2181
reference_id RHSA-2019:2181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2181
11
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
12
reference_url https://usn.ubuntu.com/3805-2/
reference_id USN-3805-2
reference_type
scores
url https://usn.ubuntu.com/3805-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.62.0
purl pkg:generic/curl.se/curl@7.62.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-79sv-kzb5-hbc4
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-ac6r-spds-qbf5
15
vulnerability VCID-arjz-67yz-wkg9
16
vulnerability VCID-bb2f-7qrm-1kca
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-cp4n-p2z3-43b4
19
vulnerability VCID-d3s1-3qs7-2uhw
20
vulnerability VCID-dc3c-3wab-57gh
21
vulnerability VCID-ddgz-rczw-jqfw
22
vulnerability VCID-dhrf-2sz5-3bhf
23
vulnerability VCID-etzn-uhck-h7b2
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-v3qf-6wju-1bg8
48
vulnerability VCID-vbbv-k1r7-kkas
49
vulnerability VCID-w8ks-xk66-r3fm
50
vulnerability VCID-wwam-tcmv-kqhc
51
vulnerability VCID-x57x-w8g8-7ybz
52
vulnerability VCID-xzay-sjpy-3yce
53
vulnerability VCID-y32p-52ps-4ug4
54
vulnerability VCID-y4x5-n5m2-x7bq
55
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.62.0
aliases CVE-2018-16842
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj
2
url VCID-2b39-ubrt-hkc6
vulnerability_id VCID-2b39-ubrt-hkc6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5436
reference_id
reference_type
scores
0
value 0.11139
scoring_system epss
scoring_elements 0.93439
published_at 2026-04-01T12:55:00Z
1
value 0.11139
scoring_system epss
scoring_elements 0.93473
published_at 2026-04-11T12:55:00Z
2
value 0.11139
scoring_system epss
scoring_elements 0.93467
published_at 2026-04-09T12:55:00Z
3
value 0.11139
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-08T12:55:00Z
4
value 0.11139
scoring_system epss
scoring_elements 0.93456
published_at 2026-04-07T12:55:00Z
5
value 0.11139
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-02T12:55:00Z
6
value 0.11139
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-04T12:55:00Z
7
value 0.13273
scoring_system epss
scoring_elements 0.94161
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5436
2
reference_url https://curl.se/docs/CVE-2019-5436.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5436.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/550696
reference_id
reference_type
scores
url https://hackerone.com/reports/550696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1710620
reference_id 1710620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1710620
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351
reference_id 929351
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351
8
reference_url https://security.archlinux.org/ASA-201905-11
reference_id ASA-201905-11
reference_type
scores
url https://security.archlinux.org/ASA-201905-11
9
reference_url https://security.archlinux.org/ASA-201905-12
reference_id ASA-201905-12
reference_type
scores
url https://security.archlinux.org/ASA-201905-12
10
reference_url https://security.archlinux.org/ASA-201905-13
reference_id ASA-201905-13
reference_type
scores
url https://security.archlinux.org/ASA-201905-13
11
reference_url https://security.archlinux.org/ASA-201905-14
reference_id ASA-201905-14
reference_type
scores
url https://security.archlinux.org/ASA-201905-14
12
reference_url https://security.archlinux.org/ASA-201905-15
reference_id ASA-201905-15
reference_type
scores
url https://security.archlinux.org/ASA-201905-15
13
reference_url https://security.archlinux.org/ASA-201905-16
reference_id ASA-201905-16
reference_type
scores
url https://security.archlinux.org/ASA-201905-16
14
reference_url https://security.archlinux.org/AVG-959
reference_id AVG-959
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-959
15
reference_url https://security.archlinux.org/AVG-960
reference_id AVG-960
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-960
16
reference_url https://security.archlinux.org/AVG-961
reference_id AVG-961
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-961
17
reference_url https://security.archlinux.org/AVG-962
reference_id AVG-962
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-962
18
reference_url https://security.archlinux.org/AVG-963
reference_id AVG-963
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-963
19
reference_url https://security.archlinux.org/AVG-964
reference_id AVG-964
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-964
20
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
21
reference_url https://access.redhat.com/errata/RHSA-2020:1020
reference_id RHSA-2020:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1020
22
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
23
reference_url https://access.redhat.com/errata/RHSA-2020:2505
reference_id RHSA-2020:2505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2505
24
reference_url https://usn.ubuntu.com/3993-1/
reference_id USN-3993-1
reference_type
scores
url https://usn.ubuntu.com/3993-1/
25
reference_url https://usn.ubuntu.com/3993-2/
reference_id USN-3993-2
reference_type
scores
url https://usn.ubuntu.com/3993-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.65.0
purl pkg:generic/curl.se/curl@7.65.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-cp4n-p2z3-43b4
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-dhrf-2sz5-3bhf
20
vulnerability VCID-etzn-uhck-h7b2
21
vulnerability VCID-frgg-29yv-dyf7
22
vulnerability VCID-ggt7-eejg-xfb6
23
vulnerability VCID-gnx2-djyk-uyaf
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-j5s3-rr74-nqb8
27
vulnerability VCID-ju6h-a1sz-f7e5
28
vulnerability VCID-mkyr-w79c-qqfz
29
vulnerability VCID-ms2r-94ph-yyh3
30
vulnerability VCID-n51k-39uk-auca
31
vulnerability VCID-n57n-cymy-z7dr
32
vulnerability VCID-nvzd-v3bs-6qek
33
vulnerability VCID-ph5u-5j8n-4qah
34
vulnerability VCID-q229-ag6u-u3hv
35
vulnerability VCID-qbpd-star-6fgn
36
vulnerability VCID-qdcn-2u3v-b3cv
37
vulnerability VCID-qpfa-s6sd-8yct
38
vulnerability VCID-r7bh-7wur-xffs
39
vulnerability VCID-rmez-cwu2-2ya7
40
vulnerability VCID-s73y-y7v7-43cm
41
vulnerability VCID-sh5a-fmna-wffr
42
vulnerability VCID-syz5-5y6f-s7er
43
vulnerability VCID-t4gn-9fw8-gkc3
44
vulnerability VCID-t8t6-9wa3-aub7
45
vulnerability VCID-u4bx-xqb3-vuef
46
vulnerability VCID-vbbv-k1r7-kkas
47
vulnerability VCID-wwam-tcmv-kqhc
48
vulnerability VCID-x57x-w8g8-7ybz
49
vulnerability VCID-xzay-sjpy-3yce
50
vulnerability VCID-y32p-52ps-4ug4
51
vulnerability VCID-y4x5-n5m2-x7bq
52
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.65.0
aliases CVE-2019-5436
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b39-ubrt-hkc6
3
url VCID-2cx5-1qnw-uufj
vulnerability_id VCID-2cx5-1qnw-uufj
summary curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16923
published_at 2026-04-11T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17246
published_at 2026-04-04T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16949
published_at 2026-04-09T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16891
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16802
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17194
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19261
published_at 2026-04-13T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
2
reference_url https://curl.se/docs/CVE-2026-1965.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
reference_id 2446448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
6
reference_url https://curl.se/docs/CVE-2026-1965.json
reference_id CVE-2026-1965.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.json
7
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
8
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.19.0
purl pkg:generic/curl.se/curl@8.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0
aliases CVE-2026-1965
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj
4
url VCID-2xmp-jc8v-bucb
vulnerability_id VCID-2xmp-jc8v-bucb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-08T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43779
published_at 2026-04-02T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43736
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-13T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52298
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52348
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52332
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
2
reference_url https://curl.se/docs/CVE-2022-35252.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-35252.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1613943
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://hackerone.com/reports/1613943
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
reference_id 1018831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/21
reference_id 21
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
reference_id 2120718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://support.apple.com/kb/HT213603
reference_id HT213603
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213603
12
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213604
13
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
14
reference_url https://security.netapp.com/advisory/ntap-20220930-0005/
reference_id ntap-20220930-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.netapp.com/advisory/ntap-20220930-0005/
15
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
16
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
17
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
18
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
19
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
20
reference_url https://usn.ubuntu.com/5587-1/
reference_id USN-5587-1
reference_type
scores
url https://usn.ubuntu.com/5587-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.85.0
purl pkg:generic/curl.se/curl@7.85.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-9nak-pscy-e7gs
11
vulnerability VCID-arjz-67yz-wkg9
12
vulnerability VCID-bz4u-6rft-s3a8
13
vulnerability VCID-cbah-e86c-w3fj
14
vulnerability VCID-ddgz-rczw-jqfw
15
vulnerability VCID-ej47-4dcu-5fhy
16
vulnerability VCID-etzn-uhck-h7b2
17
vulnerability VCID-gnx2-djyk-uyaf
18
vulnerability VCID-hrsy-694u-2fec
19
vulnerability VCID-m15r-v9sr-2bbn
20
vulnerability VCID-mkyr-w79c-qqfz
21
vulnerability VCID-ms2r-94ph-yyh3
22
vulnerability VCID-n57n-cymy-z7dr
23
vulnerability VCID-nvzd-v3bs-6qek
24
vulnerability VCID-pwn6-j8vf-rufk
25
vulnerability VCID-qdcn-2u3v-b3cv
26
vulnerability VCID-qpux-jh6k-8qhx
27
vulnerability VCID-rg54-svzj-x7f9
28
vulnerability VCID-s73y-y7v7-43cm
29
vulnerability VCID-syz5-5y6f-s7er
30
vulnerability VCID-t9p4-2x7v-yfaq
31
vulnerability VCID-tcqe-7skm-b3fz
32
vulnerability VCID-tha5-fv3w-sub6
33
vulnerability VCID-u4bx-xqb3-vuef
34
vulnerability VCID-vbbv-k1r7-kkas
35
vulnerability VCID-wgma-bycg-1qb1
36
vulnerability VCID-x57x-w8g8-7ybz
37
vulnerability VCID-xpss-yndr-mycj
38
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.85.0
aliases CVE-2022-35252
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb
5
url VCID-3sy2-4f3g-zkac
vulnerability_id VCID-3sy2-4f3g-zkac
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53814
published_at 2026-04-13T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53799
published_at 2026-04-09T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.53847
published_at 2026-04-11T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.5383
published_at 2026-04-12T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53749
published_at 2026-04-02T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53775
published_at 2026-04-04T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.53748
published_at 2026-04-07T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53801
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
2
reference_url https://curl.se/docs/CVE-2022-27774.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27774.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1543773
reference_id
reference_type
scores
url https://hackerone.com/reports/1543773
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
reference_id 1010254
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
reference_id 2077547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
25
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
26
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.0
purl pkg:generic/curl.se/curl@7.83.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-47qb-2qkw-1qej
4
vulnerability VCID-4e1k-7bj9-hfch
5
vulnerability VCID-4gze-cwtp-2bgr
6
vulnerability VCID-6ge5-86tg-dydf
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hjkx-6yep-mkde
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-m15r-v9sr-2bbn
24
vulnerability VCID-mkyr-w79c-qqfz
25
vulnerability VCID-ms2r-94ph-yyh3
26
vulnerability VCID-n57n-cymy-z7dr
27
vulnerability VCID-nvzd-v3bs-6qek
28
vulnerability VCID-pwn6-j8vf-rufk
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-rhxh-77pj-1bfy
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-syz5-5y6f-s7er
34
vulnerability VCID-t1fk-cbsx-j3gh
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-v9n1-d6xt-6ubn
39
vulnerability VCID-vbbv-k1r7-kkas
40
vulnerability VCID-wgma-bycg-1qb1
41
vulnerability VCID-x57x-w8g8-7ybz
42
vulnerability VCID-xpss-yndr-mycj
43
vulnerability VCID-xzay-sjpy-3yce
44
vulnerability VCID-y4x5-n5m2-x7bq
45
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0
aliases CVE-2022-27774
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac
6
url VCID-47qb-2qkw-1qej
vulnerability_id VCID-47qb-2qkw-1qej
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.5302
published_at 2026-04-13T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.52966
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.52991
published_at 2026-04-04T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.52959
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53009
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53003
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53052
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53037
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
2
reference_url https://curl.se/docs/CVE-2023-28321.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28321.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1950627
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://hackerone.com/reports/1950627
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
reference_id 2196786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4523
reference_id RHSA-2023:4523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4523
20
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
21
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
22
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
23
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
24
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
25
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28321
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej
7
url VCID-56wg-yafz-gkgx
vulnerability_id VCID-56wg-yafz-gkgx
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34891
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35012
published_at 2026-04-13T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35067
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35071
published_at 2026-04-11T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-12T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35088
published_at 2026-04-02T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-04T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34995
published_at 2026-04-07T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35039
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
2
reference_url https://curl.se/docs/CVE-2021-22922.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22922.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213175
reference_id
reference_type
scores
url https://hackerone.com/reports/1213175
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
reference_id 1981435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
10
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
11
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22922
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx
8
url VCID-5n7a-9j23-e7dj
vulnerability_id VCID-5n7a-9j23-e7dj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16839
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52577
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-02T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52647
published_at 2026-04-04T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52613
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52664
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52659
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52709
published_at 2026-04-11T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58515
published_at 2026-04-12T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58495
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16839
2
reference_url https://curl.se/docs/CVE-2018-16839.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16839.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642201
reference_id 1642201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642201
7
reference_url https://security.archlinux.org/ASA-201811-7
reference_id ASA-201811-7
reference_type
scores
url https://security.archlinux.org/ASA-201811-7
8
reference_url https://security.archlinux.org/ASA-201811-8
reference_id ASA-201811-8
reference_type
scores
url https://security.archlinux.org/ASA-201811-8
9
reference_url https://security.archlinux.org/ASA-201811-9
reference_id ASA-201811-9
reference_type
scores
url https://security.archlinux.org/ASA-201811-9
10
reference_url https://security.archlinux.org/AVG-796
reference_id AVG-796
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-796
11
reference_url https://security.archlinux.org/AVG-797
reference_id AVG-797
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-797
12
reference_url https://security.archlinux.org/AVG-798
reference_id AVG-798
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-798
13
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
14
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.62.0
purl pkg:generic/curl.se/curl@7.62.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-79sv-kzb5-hbc4
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-ac6r-spds-qbf5
15
vulnerability VCID-arjz-67yz-wkg9
16
vulnerability VCID-bb2f-7qrm-1kca
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-cp4n-p2z3-43b4
19
vulnerability VCID-d3s1-3qs7-2uhw
20
vulnerability VCID-dc3c-3wab-57gh
21
vulnerability VCID-ddgz-rczw-jqfw
22
vulnerability VCID-dhrf-2sz5-3bhf
23
vulnerability VCID-etzn-uhck-h7b2
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-v3qf-6wju-1bg8
48
vulnerability VCID-vbbv-k1r7-kkas
49
vulnerability VCID-w8ks-xk66-r3fm
50
vulnerability VCID-wwam-tcmv-kqhc
51
vulnerability VCID-x57x-w8g8-7ybz
52
vulnerability VCID-xzay-sjpy-3yce
53
vulnerability VCID-y32p-52ps-4ug4
54
vulnerability VCID-y4x5-n5m2-x7bq
55
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.62.0
aliases CVE-2018-16839
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7a-9j23-e7dj
9
url VCID-6we4-n888-6qhe
vulnerability_id VCID-6we4-n888-6qhe
summary libcurl: Buffer Overflow in libcurl via zlib Integer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.6327
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-09T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-11T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-12T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-02T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63823
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63815
published_at 2026-04-04T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63772
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
2
reference_url https://curl.se/docs/CVE-2025-0725.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2956023
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://hackerone.com/reports/2956023
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
reference_id 2343899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
7
reference_url https://curl.se/docs/CVE-2025-0725.json
reference_id CVE-2025-0725.json
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.json
fixed_packages
0
url pkg:generic/curl.se/curl@8.12.0
purl pkg:generic/curl.se/curl@8.12.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-8zks-th64-33b8
4
vulnerability VCID-9mjz-apkm-g7h1
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-kt4b-7ffh-4bch
8
vulnerability VCID-mkyr-w79c-qqfz
9
vulnerability VCID-nvzd-v3bs-6qek
10
vulnerability VCID-qpux-jh6k-8qhx
11
vulnerability VCID-vbbv-k1r7-kkas
12
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0
aliases CVE-2025-0725
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe
10
url VCID-75nw-4e2d-zqgg
vulnerability_id VCID-75nw-4e2d-zqgg
summary curl: libcurl: ASN.1 date parser overread
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7264
reference_id
reference_type
scores
0
value 0.00796
scoring_system epss
scoring_elements 0.73947
published_at 2026-04-02T12:55:00Z
1
value 0.00796
scoring_system epss
scoring_elements 0.73978
published_at 2026-04-08T12:55:00Z
2
value 0.00796
scoring_system epss
scoring_elements 0.73943
published_at 2026-04-07T12:55:00Z
3
value 0.00796
scoring_system epss
scoring_elements 0.73973
published_at 2026-04-04T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75396
published_at 2026-04-13T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75409
published_at 2026-04-09T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75429
published_at 2026-04-11T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/31/1
reference_id 1
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url http://www.openwall.com/lists/oss-security/2024/07/31/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656
reference_id 1077656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2301888
reference_id 2301888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2301888
7
reference_url https://hackerone.com/reports/2629968
reference_id 2629968
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://hackerone.com/reports/2629968
8
reference_url https://curl.se/docs/CVE-2024-7264.html
reference_id CVE-2024-7264.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://curl.se/docs/CVE-2024-7264.html
9
reference_url https://curl.se/docs/CVE-2024-7264.json
reference_id CVE-2024-7264.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://curl.se/docs/CVE-2024-7264.json
10
reference_url https://access.redhat.com/errata/RHSA-2024:7726
reference_id RHSA-2024:7726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7726
11
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
12
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
13
reference_url https://usn.ubuntu.com/6944-1/
reference_id USN-6944-1
reference_type
scores
url https://usn.ubuntu.com/6944-1/
14
reference_url https://usn.ubuntu.com/6944-2/
reference_id USN-6944-2
reference_type
scores
url https://usn.ubuntu.com/6944-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.9.1
purl pkg:generic/curl.se/curl@8.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-9mjz-apkm-g7h1
6
vulnerability VCID-etzn-uhck-h7b2
7
vulnerability VCID-hrsy-694u-2fec
8
vulnerability VCID-kt4b-7ffh-4bch
9
vulnerability VCID-mkyr-w79c-qqfz
10
vulnerability VCID-nvzd-v3bs-6qek
11
vulnerability VCID-pwn6-j8vf-rufk
12
vulnerability VCID-qpux-jh6k-8qhx
13
vulnerability VCID-t9p4-2x7v-yfaq
14
vulnerability VCID-vbbv-k1r7-kkas
15
vulnerability VCID-wgma-bycg-1qb1
16
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.9.1
aliases CVE-2024-7264
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg
11
url VCID-79sv-kzb5-hbc4
vulnerability_id VCID-79sv-kzb5-hbc4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3822
reference_id
reference_type
scores
0
value 0.16566
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-01T12:55:00Z
1
value 0.16566
scoring_system epss
scoring_elements 0.94916
published_at 2026-04-13T12:55:00Z
2
value 0.16566
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-02T12:55:00Z
3
value 0.16566
scoring_system epss
scoring_elements 0.94891
published_at 2026-04-04T12:55:00Z
4
value 0.16566
scoring_system epss
scoring_elements 0.94893
published_at 2026-04-07T12:55:00Z
5
value 0.16566
scoring_system epss
scoring_elements 0.94902
published_at 2026-04-08T12:55:00Z
6
value 0.16566
scoring_system epss
scoring_elements 0.94907
published_at 2026-04-09T12:55:00Z
7
value 0.16566
scoring_system epss
scoring_elements 0.94911
published_at 2026-04-11T12:55:00Z
8
value 0.16566
scoring_system epss
scoring_elements 0.94913
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3822
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2019-3822.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-3822.html
5
reference_url https://curl.se/docs/CVE-2019-3822.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-3822.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://security.netapp.com/advisory/ntap-20190719-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190719-0004/
13
reference_url https://support.f5.com/csp/article/K84141449
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K84141449
14
reference_url https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS
15
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
16
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
18
reference_url http://www.securityfocus.com/bid/106950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106950
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670254
reference_id 1670254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670254
20
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
21
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
22
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
23
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
24
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
25
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
26
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
27
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
28
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
29
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3822
reference_id CVE-2019-3822
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3822
53
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
54
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
55
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.64.0
purl pkg:generic/curl.se/curl@7.64.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-ac6r-spds-qbf5
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-cp4n-p2z3-43b4
18
vulnerability VCID-d3s1-3qs7-2uhw
19
vulnerability VCID-dc3c-3wab-57gh
20
vulnerability VCID-ddgz-rczw-jqfw
21
vulnerability VCID-dhrf-2sz5-3bhf
22
vulnerability VCID-etzn-uhck-h7b2
23
vulnerability VCID-frgg-29yv-dyf7
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-vbbv-k1r7-kkas
48
vulnerability VCID-wwam-tcmv-kqhc
49
vulnerability VCID-x57x-w8g8-7ybz
50
vulnerability VCID-xzay-sjpy-3yce
51
vulnerability VCID-y32p-52ps-4ug4
52
vulnerability VCID-y4x5-n5m2-x7bq
53
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.64.0
aliases CVE-2019-3822
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79sv-kzb5-hbc4
12
url VCID-7srk-hshe-h3f4
vulnerability_id VCID-7srk-hshe-h3f4
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03588
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03622
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.036
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03599
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03574
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05601
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
2
reference_url https://curl.se/docs/CVE-2023-27538.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27538.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1898475
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://hackerone.com/reports/1898475
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
reference_id 2179103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
reference_id CVE-2023-27538
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
9
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.gentoo.org/glsa/202310-12
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
11
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
12
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
13
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27538
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4
13
url VCID-8zks-th64-33b8
vulnerability_id VCID-8zks-th64-33b8
summary curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03044
published_at 2026-04-11T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03051
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03081
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03056
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03053
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03037
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03683
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03709
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
2
reference_url https://curl.se/docs/CVE-2026-3784.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3584903
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://hackerone.com/reports/3584903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
reference_id 2446449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
7
reference_url https://curl.se/docs/CVE-2026-3784.json
reference_id CVE-2026-3784.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.json
8
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
9
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.19.0
purl pkg:generic/curl.se/curl@8.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0
aliases CVE-2026-3784
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8
14
url VCID-9cbd-x468-rkaw
vulnerability_id VCID-9cbd-x468-rkaw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16840
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.451
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53783
published_at 2026-04-13T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53718
published_at 2026-04-02T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53745
published_at 2026-04-04T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53717
published_at 2026-04-07T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.5377
published_at 2026-04-08T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53767
published_at 2026-04-09T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53815
published_at 2026-04-11T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16840
2
reference_url https://curl.se/docs/CVE-2018-16840.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16840.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642203
reference_id 1642203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642203
6
reference_url https://security.archlinux.org/ASA-201811-4
reference_id ASA-201811-4
reference_type
scores
url https://security.archlinux.org/ASA-201811-4
7
reference_url https://security.archlinux.org/ASA-201811-5
reference_id ASA-201811-5
reference_type
scores
url https://security.archlinux.org/ASA-201811-5
8
reference_url https://security.archlinux.org/ASA-201811-6
reference_id ASA-201811-6
reference_type
scores
url https://security.archlinux.org/ASA-201811-6
9
reference_url https://security.archlinux.org/ASA-201811-7
reference_id ASA-201811-7
reference_type
scores
url https://security.archlinux.org/ASA-201811-7
10
reference_url https://security.archlinux.org/ASA-201811-8
reference_id ASA-201811-8
reference_type
scores
url https://security.archlinux.org/ASA-201811-8
11
reference_url https://security.archlinux.org/ASA-201811-9
reference_id ASA-201811-9
reference_type
scores
url https://security.archlinux.org/ASA-201811-9
12
reference_url https://security.archlinux.org/AVG-795
reference_id AVG-795
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-795
13
reference_url https://security.archlinux.org/AVG-796
reference_id AVG-796
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-796
14
reference_url https://security.archlinux.org/AVG-797
reference_id AVG-797
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-797
15
reference_url https://security.archlinux.org/AVG-798
reference_id AVG-798
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-798
16
reference_url https://security.archlinux.org/AVG-799
reference_id AVG-799
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-799
17
reference_url https://security.archlinux.org/AVG-800
reference_id AVG-800
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-800
18
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
19
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.62.0
purl pkg:generic/curl.se/curl@7.62.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-79sv-kzb5-hbc4
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-ac6r-spds-qbf5
15
vulnerability VCID-arjz-67yz-wkg9
16
vulnerability VCID-bb2f-7qrm-1kca
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-cp4n-p2z3-43b4
19
vulnerability VCID-d3s1-3qs7-2uhw
20
vulnerability VCID-dc3c-3wab-57gh
21
vulnerability VCID-ddgz-rczw-jqfw
22
vulnerability VCID-dhrf-2sz5-3bhf
23
vulnerability VCID-etzn-uhck-h7b2
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-v3qf-6wju-1bg8
48
vulnerability VCID-vbbv-k1r7-kkas
49
vulnerability VCID-w8ks-xk66-r3fm
50
vulnerability VCID-wwam-tcmv-kqhc
51
vulnerability VCID-x57x-w8g8-7ybz
52
vulnerability VCID-xzay-sjpy-3yce
53
vulnerability VCID-y32p-52ps-4ug4
54
vulnerability VCID-y4x5-n5m2-x7bq
55
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.62.0
aliases CVE-2018-16840
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cbd-x468-rkaw
15
url VCID-9ggp-5wfj-ufcq
vulnerability_id VCID-9ggp-5wfj-ufcq
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42409
published_at 2026-04-13T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42428
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42458
published_at 2026-04-04T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42397
published_at 2026-04-07T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42447
published_at 2026-04-08T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42455
published_at 2026-04-09T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42477
published_at 2026-04-11T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.4244
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
2
reference_url https://curl.se/docs/CVE-2022-43552.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-43552.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1764858
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://hackerone.com/reports/1764858
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
reference_id 1026830
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
8
reference_url http://seclists.org/fulldisclosure/2023/Mar/17
reference_id 17
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url http://seclists.org/fulldisclosure/2023/Mar/17
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
reference_id 2152652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://support.apple.com/kb/HT213670
reference_id HT213670
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://support.apple.com/kb/HT213670
12
reference_url https://security.netapp.com/advisory/ntap-20230214-0002/
reference_id ntap-20230214-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.netapp.com/advisory/ntap-20230214-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
14
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
15
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
16
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
17
reference_url https://access.redhat.com/errata/RHSA-2023:7743
reference_id RHSA-2023:7743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7743
18
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
19
reference_url https://usn.ubuntu.com/5788-1/
reference_id USN-5788-1
reference_type
scores
url https://usn.ubuntu.com/5788-1/
20
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.87.0
purl pkg:generic/curl.se/curl@7.87.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-5xp7-mcsa-uqd4
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-arjz-67yz-wkg9
11
vulnerability VCID-bz4u-6rft-s3a8
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-etzn-uhck-h7b2
15
vulnerability VCID-gnx2-djyk-uyaf
16
vulnerability VCID-hrsy-694u-2fec
17
vulnerability VCID-m15r-v9sr-2bbn
18
vulnerability VCID-mkyr-w79c-qqfz
19
vulnerability VCID-ms2r-94ph-yyh3
20
vulnerability VCID-n57n-cymy-z7dr
21
vulnerability VCID-nvzd-v3bs-6qek
22
vulnerability VCID-pwn6-j8vf-rufk
23
vulnerability VCID-qdcn-2u3v-b3cv
24
vulnerability VCID-qpux-jh6k-8qhx
25
vulnerability VCID-s73y-y7v7-43cm
26
vulnerability VCID-syz5-5y6f-s7er
27
vulnerability VCID-t9p4-2x7v-yfaq
28
vulnerability VCID-tcqe-7skm-b3fz
29
vulnerability VCID-tha5-fv3w-sub6
30
vulnerability VCID-u4bx-xqb3-vuef
31
vulnerability VCID-vbbv-k1r7-kkas
32
vulnerability VCID-wgma-bycg-1qb1
33
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.87.0
aliases CVE-2022-43552
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq
16
url VCID-9nak-pscy-e7gs
vulnerability_id VCID-9nak-pscy-e7gs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-13T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-12T12:55:00Z
2
value 0.02591
scoring_system epss
scoring_elements 0.85547
published_at 2026-04-04T12:55:00Z
3
value 0.02591
scoring_system epss
scoring_elements 0.8553
published_at 2026-04-02T12:55:00Z
4
value 0.02753
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-11T12:55:00Z
5
value 0.02753
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-07T12:55:00Z
6
value 0.02753
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-09T12:55:00Z
7
value 0.02753
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
2
reference_url https://curl.se/docs/CVE-2022-32221.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32221.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1704017
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://hackerone.com/reports/1704017
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
reference_id 2135411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
10
reference_url http://www.openwall.com/lists/oss-security/2023/05/17/4
reference_id 4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://www.openwall.com/lists/oss-security/2023/05/17/4
11
reference_url https://www.debian.org/security/2023/dsa-5330
reference_id dsa-5330
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://www.debian.org/security/2023/dsa-5330
12
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.gentoo.org/glsa/202212-01
13
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213604
14
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213605
15
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
16
reference_url https://security.netapp.com/advisory/ntap-20230110-0006/
reference_id ntap-20230110-0006
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230110-0006/
17
reference_url https://security.netapp.com/advisory/ntap-20230208-0002/
reference_id ntap-20230208-0002
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230208-0002/
18
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
19
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
20
reference_url https://access.redhat.com/errata/RHSA-2023:0333
reference_id RHSA-2023:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0333
21
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
22
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
23
reference_url https://usn.ubuntu.com/5702-2/
reference_id USN-5702-2
reference_type
scores
url https://usn.ubuntu.com/5702-2/
24
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.86.0
purl pkg:generic/curl.se/curl@7.86.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-arjz-67yz-wkg9
11
vulnerability VCID-bz4u-6rft-s3a8
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-etzn-uhck-h7b2
15
vulnerability VCID-gnx2-djyk-uyaf
16
vulnerability VCID-hrsy-694u-2fec
17
vulnerability VCID-m15r-v9sr-2bbn
18
vulnerability VCID-mkyr-w79c-qqfz
19
vulnerability VCID-ms2r-94ph-yyh3
20
vulnerability VCID-n57n-cymy-z7dr
21
vulnerability VCID-nvzd-v3bs-6qek
22
vulnerability VCID-pwn6-j8vf-rufk
23
vulnerability VCID-qdcn-2u3v-b3cv
24
vulnerability VCID-qpux-jh6k-8qhx
25
vulnerability VCID-s73y-y7v7-43cm
26
vulnerability VCID-syz5-5y6f-s7er
27
vulnerability VCID-t9p4-2x7v-yfaq
28
vulnerability VCID-tcqe-7skm-b3fz
29
vulnerability VCID-tha5-fv3w-sub6
30
vulnerability VCID-u4bx-xqb3-vuef
31
vulnerability VCID-vbbv-k1r7-kkas
32
vulnerability VCID-wgma-bycg-1qb1
33
vulnerability VCID-x57x-w8g8-7ybz
34
vulnerability VCID-xpss-yndr-mycj
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.86.0
aliases CVE-2022-32221
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs
17
url VCID-arjz-67yz-wkg9
vulnerability_id VCID-arjz-67yz-wkg9
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40415
published_at 2026-04-13T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40439
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40465
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40389
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.4044
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40451
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40472
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40434
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
2
reference_url https://curl.se/docs/CVE-2023-27533.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27533.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1891474
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://hackerone.com/reports/1891474
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
reference_id 2179062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
10
reference_url https://security.netapp.com/advisory/ntap-20230420-0011/
reference_id ntap-20230420-0011
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.netapp.com/advisory/ntap-20230420-0011/
11
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
12
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
13
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
14
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
15
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27533
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9
18
url VCID-bb2f-7qrm-1kca
vulnerability_id VCID-bb2f-7qrm-1kca
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27781
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22992
published_at 2026-04-13T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23066
published_at 2026-04-09T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23085
published_at 2026-04-11T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23049
published_at 2026-04-12T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-02T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-04T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.2294
published_at 2026-04-07T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23013
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27781
2
reference_url https://curl.se/docs/CVE-2022-27781.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27781.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1555441
reference_id
reference_type
scores
url https://hackerone.com/reports/1555441
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082204
reference_id 2082204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082204
21
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
22
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
23
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
24
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
25
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
26
reference_url https://usn.ubuntu.com/5499-1/
reference_id USN-5499-1
reference_type
scores
url https://usn.ubuntu.com/5499-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.1
purl pkg:generic/curl.se/curl@7.83.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-6we4-n888-6qhe
6
vulnerability VCID-75nw-4e2d-zqgg
7
vulnerability VCID-7srk-hshe-h3f4
8
vulnerability VCID-8zks-th64-33b8
9
vulnerability VCID-9ggp-5wfj-ufcq
10
vulnerability VCID-9nak-pscy-e7gs
11
vulnerability VCID-arjz-67yz-wkg9
12
vulnerability VCID-cbah-e86c-w3fj
13
vulnerability VCID-ddgz-rczw-jqfw
14
vulnerability VCID-ej47-4dcu-5fhy
15
vulnerability VCID-etzn-uhck-h7b2
16
vulnerability VCID-gnx2-djyk-uyaf
17
vulnerability VCID-gv7x-j8bz-wycc
18
vulnerability VCID-hrsy-694u-2fec
19
vulnerability VCID-m15r-v9sr-2bbn
20
vulnerability VCID-mkyr-w79c-qqfz
21
vulnerability VCID-ms2r-94ph-yyh3
22
vulnerability VCID-n57n-cymy-z7dr
23
vulnerability VCID-nvzd-v3bs-6qek
24
vulnerability VCID-pwn6-j8vf-rufk
25
vulnerability VCID-qdcn-2u3v-b3cv
26
vulnerability VCID-qpux-jh6k-8qhx
27
vulnerability VCID-s73y-y7v7-43cm
28
vulnerability VCID-syz5-5y6f-s7er
29
vulnerability VCID-t1fk-cbsx-j3gh
30
vulnerability VCID-t9p4-2x7v-yfaq
31
vulnerability VCID-tcqe-7skm-b3fz
32
vulnerability VCID-u4bx-xqb3-vuef
33
vulnerability VCID-vbbv-k1r7-kkas
34
vulnerability VCID-wgma-bycg-1qb1
35
vulnerability VCID-x57x-w8g8-7ybz
36
vulnerability VCID-xpss-yndr-mycj
37
vulnerability VCID-xzay-sjpy-3yce
38
vulnerability VCID-y4x5-n5m2-x7bq
39
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.1
aliases CVE-2022-27781
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca
19
url VCID-cbah-e86c-w3fj
vulnerability_id VCID-cbah-e86c-w3fj
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-13T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20386
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20446
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20251
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20311
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20341
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20295
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
2
reference_url https://curl.se/docs/CVE-2023-27535.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27535.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1892780
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://hackerone.com/reports/1892780
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
reference_id 2179073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
reference_id CVE-2023-27535
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2650
reference_id RHSA-2023:2650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2650
14
reference_url https://access.redhat.com/errata/RHSA-2023:3106
reference_id RHSA-2023:3106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3106
15
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
16
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
17
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27535
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj
20
url VCID-cp4n-p2z3-43b4
vulnerability_id VCID-cp4n-p2z3-43b4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8177
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05444
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05526
published_at 2026-04-13T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0557
published_at 2026-04-09T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-11T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05479
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05514
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05549
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8177
2
reference_url https://curl.se/docs/CVE-2020-8177.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8177.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/887462
reference_id
reference_type
scores
url https://hackerone.com/reports/887462
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1847915
reference_id 1847915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1847915
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281
reference_id 965281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281
15
reference_url https://security.archlinux.org/AVG-1194
reference_id AVG-1194
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1194
16
reference_url https://security.gentoo.org/glsa/202007-16
reference_id GLSA-202007-16
reference_type
scores
url https://security.gentoo.org/glsa/202007-16
17
reference_url https://access.redhat.com/errata/RHSA-2020:4599
reference_id RHSA-2020:4599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4599
18
reference_url https://access.redhat.com/errata/RHSA-2020:5002
reference_id RHSA-2020:5002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5002
19
reference_url https://access.redhat.com/errata/RHSA-2020:5417
reference_id RHSA-2020:5417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5417
20
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
21
reference_url https://usn.ubuntu.com/4402-1/
reference_id USN-4402-1
reference_type
scores
url https://usn.ubuntu.com/4402-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.71.0
purl pkg:generic/curl.se/curl@7.71.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-d3s1-3qs7-2uhw
16
vulnerability VCID-dc3c-3wab-57gh
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-frgg-29yv-dyf7
20
vulnerability VCID-ggt7-eejg-xfb6
21
vulnerability VCID-gnx2-djyk-uyaf
22
vulnerability VCID-gv7x-j8bz-wycc
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-ju6h-a1sz-f7e5
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n51k-39uk-auca
29
vulnerability VCID-n57n-cymy-z7dr
30
vulnerability VCID-nvzd-v3bs-6qek
31
vulnerability VCID-ph5u-5j8n-4qah
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-rmez-cwu2-2ya7
38
vulnerability VCID-s73y-y7v7-43cm
39
vulnerability VCID-sh5a-fmna-wffr
40
vulnerability VCID-syz5-5y6f-s7er
41
vulnerability VCID-t1fk-cbsx-j3gh
42
vulnerability VCID-t4gn-9fw8-gkc3
43
vulnerability VCID-t8t6-9wa3-aub7
44
vulnerability VCID-tcqe-7skm-b3fz
45
vulnerability VCID-u4bx-xqb3-vuef
46
vulnerability VCID-vbbv-k1r7-kkas
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xzay-sjpy-3yce
49
vulnerability VCID-y32p-52ps-4ug4
50
vulnerability VCID-y4x5-n5m2-x7bq
51
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.71.0
aliases CVE-2020-8177
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4n-p2z3-43b4
21
url VCID-d3s1-3qs7-2uhw
vulnerability_id VCID-d3s1-3qs7-2uhw
summary curl: Cipher settings shared for all connections when using schannel TLS backed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22897
reference_id
reference_type
scores
0
value 0.00791
scoring_system epss
scoring_elements 0.73845
published_at 2026-04-01T12:55:00Z
1
value 0.00791
scoring_system epss
scoring_elements 0.73894
published_at 2026-04-13T12:55:00Z
2
value 0.00791
scoring_system epss
scoring_elements 0.73921
published_at 2026-04-11T12:55:00Z
3
value 0.00791
scoring_system epss
scoring_elements 0.73903
published_at 2026-04-12T12:55:00Z
4
value 0.00791
scoring_system epss
scoring_elements 0.73855
published_at 2026-04-02T12:55:00Z
5
value 0.00791
scoring_system epss
scoring_elements 0.7388
published_at 2026-04-04T12:55:00Z
6
value 0.00791
scoring_system epss
scoring_elements 0.73851
published_at 2026-04-07T12:55:00Z
7
value 0.00791
scoring_system epss
scoring_elements 0.73886
published_at 2026-04-08T12:55:00Z
8
value 0.00791
scoring_system epss
scoring_elements 0.73899
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22897
2
reference_url https://curl.se/docs/CVE-2021-22897.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22897.html
3
reference_url https://hackerone.com/reports/1172857
reference_id
reference_type
scores
url https://hackerone.com/reports/1172857
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964904
reference_id 1964904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964904
5
reference_url https://security.archlinux.org/AVG-2016
reference_id AVG-2016
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2016
fixed_packages
0
url pkg:generic/curl.se/curl@7.77.0
purl pkg:generic/curl.se/curl@7.77.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-6we4-n888-6qhe
9
vulnerability VCID-75nw-4e2d-zqgg
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-bdy2-8gub-tfe6
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-dc3c-3wab-57gh
19
vulnerability VCID-ddgz-rczw-jqfw
20
vulnerability VCID-ej47-4dcu-5fhy
21
vulnerability VCID-etzn-uhck-h7b2
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-pwn6-j8vf-rufk
31
vulnerability VCID-q229-ag6u-u3hv
32
vulnerability VCID-qbpd-star-6fgn
33
vulnerability VCID-qdcn-2u3v-b3cv
34
vulnerability VCID-qpux-jh6k-8qhx
35
vulnerability VCID-r7bh-7wur-xffs
36
vulnerability VCID-s73y-y7v7-43cm
37
vulnerability VCID-sh5a-fmna-wffr
38
vulnerability VCID-syz5-5y6f-s7er
39
vulnerability VCID-t1fk-cbsx-j3gh
40
vulnerability VCID-t4gn-9fw8-gkc3
41
vulnerability VCID-t8t6-9wa3-aub7
42
vulnerability VCID-t9p4-2x7v-yfaq
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-wgma-bycg-1qb1
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xpss-yndr-mycj
49
vulnerability VCID-xzay-sjpy-3yce
50
vulnerability VCID-y32p-52ps-4ug4
51
vulnerability VCID-y4x5-n5m2-x7bq
52
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.77.0
aliases CVE-2021-22897
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw
22
url VCID-dc3c-3wab-57gh
vulnerability_id VCID-dc3c-3wab-57gh
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22926.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22926
reference_id
reference_type
scores
0
value 0.00657
scoring_system epss
scoring_elements 0.70966
published_at 2026-04-01T12:55:00Z
1
value 0.00657
scoring_system epss
scoring_elements 0.71016
published_at 2026-04-13T12:55:00Z
2
value 0.00657
scoring_system epss
scoring_elements 0.71048
published_at 2026-04-11T12:55:00Z
3
value 0.00657
scoring_system epss
scoring_elements 0.71032
published_at 2026-04-12T12:55:00Z
4
value 0.00657
scoring_system epss
scoring_elements 0.70976
published_at 2026-04-02T12:55:00Z
5
value 0.00657
scoring_system epss
scoring_elements 0.70993
published_at 2026-04-04T12:55:00Z
6
value 0.00657
scoring_system epss
scoring_elements 0.70968
published_at 2026-04-07T12:55:00Z
7
value 0.00657
scoring_system epss
scoring_elements 0.7101
published_at 2026-04-08T12:55:00Z
8
value 0.00657
scoring_system epss
scoring_elements 0.71025
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22926
2
reference_url https://curl.se/docs/CVE-2021-22926.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22926.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1234760
reference_id
reference_type
scores
url https://hackerone.com/reports/1234760
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016088
reference_id 2016088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016088
6
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22926
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc3c-3wab-57gh
23
url VCID-ddgz-rczw-jqfw
vulnerability_id VCID-ddgz-rczw-jqfw
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67546
published_at 2026-04-13T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67504
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67526
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67556
published_at 2026-04-08T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.6757
published_at 2026-04-09T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67579
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
2
reference_url https://curl.se/docs/CVE-2023-28320.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28320.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1929597
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://hackerone.com/reports/1929597
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
reference_id 2196783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.gentoo.org/glsa/202310-12
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28320
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw
24
url VCID-dhrf-2sz5-3bhf
vulnerability_id VCID-dhrf-2sz5-3bhf
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5481
reference_id
reference_type
scores
0
value 0.03017
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-13T12:55:00Z
1
value 0.03017
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-12T12:55:00Z
2
value 0.04042
scoring_system epss
scoring_elements 0.88514
published_at 2026-04-11T12:55:00Z
3
value 0.04042
scoring_system epss
scoring_elements 0.88452
published_at 2026-04-01T12:55:00Z
4
value 0.04042
scoring_system epss
scoring_elements 0.8846
published_at 2026-04-02T12:55:00Z
5
value 0.04042
scoring_system epss
scoring_elements 0.88476
published_at 2026-04-04T12:55:00Z
6
value 0.04042
scoring_system epss
scoring_elements 0.88479
published_at 2026-04-07T12:55:00Z
7
value 0.04042
scoring_system epss
scoring_elements 0.88497
published_at 2026-04-08T12:55:00Z
8
value 0.04042
scoring_system epss
scoring_elements 0.88503
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5481
2
reference_url https://curl.se/docs/CVE-2019-5481.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5481.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/686823
reference_id
reference_type
scores
url https://hackerone.com/reports/686823
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1749402
reference_id 1749402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1749402
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009
reference_id 940009
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009
9
reference_url https://security.archlinux.org/AVG-1982
reference_id AVG-1982
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1982
10
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
11
reference_url https://access.redhat.com/errata/RHSA-2020:0250
reference_id RHSA-2020:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0250
12
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
13
reference_url https://usn.ubuntu.com/4129-1/
reference_id USN-4129-1
reference_type
scores
url https://usn.ubuntu.com/4129-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.66.0
purl pkg:generic/curl.se/curl@7.66.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-cp4n-p2z3-43b4
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-j5s3-rr74-nqb8
26
vulnerability VCID-ju6h-a1sz-f7e5
27
vulnerability VCID-mkyr-w79c-qqfz
28
vulnerability VCID-ms2r-94ph-yyh3
29
vulnerability VCID-n51k-39uk-auca
30
vulnerability VCID-n57n-cymy-z7dr
31
vulnerability VCID-nvzd-v3bs-6qek
32
vulnerability VCID-ph5u-5j8n-4qah
33
vulnerability VCID-q229-ag6u-u3hv
34
vulnerability VCID-qbpd-star-6fgn
35
vulnerability VCID-qdcn-2u3v-b3cv
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-rmez-cwu2-2ya7
38
vulnerability VCID-s73y-y7v7-43cm
39
vulnerability VCID-sh5a-fmna-wffr
40
vulnerability VCID-syz5-5y6f-s7er
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-u4bx-xqb3-vuef
44
vulnerability VCID-vbbv-k1r7-kkas
45
vulnerability VCID-x57x-w8g8-7ybz
46
vulnerability VCID-xzay-sjpy-3yce
47
vulnerability VCID-y32p-52ps-4ug4
48
vulnerability VCID-y4x5-n5m2-x7bq
49
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.66.0
aliases CVE-2019-5481
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrf-2sz5-3bhf
25
url VCID-etzn-uhck-h7b2
vulnerability_id VCID-etzn-uhck-h7b2
summary curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3783
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.035
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03509
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03544
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03521
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0352
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03496
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04175
published_at 2026-04-13T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.042
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3783
2
reference_url https://curl.se/docs/CVE-2026-3783.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://curl.se/docs/CVE-2026-3783.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3583983
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://hackerone.com/reports/3583983
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446450
reference_id 2446450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446450
7
reference_url https://curl.se/docs/CVE-2026-3783.json
reference_id CVE-2026-3783.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://curl.se/docs/CVE-2026-3783.json
8
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
9
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.19.0
purl pkg:generic/curl.se/curl@8.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0
aliases CVE-2026-3783
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2
26
url VCID-ggt7-eejg-xfb6
vulnerability_id VCID-ggt7-eejg-xfb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20928
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21078
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-08T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20845
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-11T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-09T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30153
published_at 2026-04-13T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
2
reference_url https://curl.se/docs/CVE-2021-22876.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://curl.se/docs/CVE-2021-22876.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1101882
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://hackerone.com/reports/1101882
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
reference_id 1941964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
reference_id 2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
reference_id 986269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
16
reference_url https://security.archlinux.org/AVG-1753
reference_id AVG-1753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1753
17
reference_url https://security.archlinux.org/AVG-1754
reference_id AVG-1754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1754
18
reference_url https://security.archlinux.org/AVG-1755
reference_id AVG-1755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1755
19
reference_url https://security.archlinux.org/AVG-1756
reference_id AVG-1756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1756
20
reference_url https://security.archlinux.org/AVG-1757
reference_id AVG-1757
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1757
21
reference_url https://security.archlinux.org/AVG-1758
reference_id AVG-1758
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1758
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
reference_id CVE-2021-22876
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
23
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.gentoo.org/glsa/202105-36
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
reference_id ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
reference_id KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
27
reference_url https://security.netapp.com/advisory/ntap-20210521-0007/
reference_id ntap-20210521-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.netapp.com/advisory/ntap-20210521-0007/
28
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
29
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
30
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/4898-1/
reference_id USN-4898-1
reference_type
scores
url https://usn.ubuntu.com/4898-1/
33
reference_url https://usn.ubuntu.com/4903-1/
reference_id USN-4903-1
reference_type
scores
url https://usn.ubuntu.com/4903-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.76.0
purl pkg:generic/curl.se/curl@7.76.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-38mv-usbe-z7hd
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-d3s1-3qs7-2uhw
18
vulnerability VCID-dc3c-3wab-57gh
19
vulnerability VCID-ddgz-rczw-jqfw
20
vulnerability VCID-etzn-uhck-h7b2
21
vulnerability VCID-gnx2-djyk-uyaf
22
vulnerability VCID-gv7x-j8bz-wycc
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-mkyr-w79c-qqfz
26
vulnerability VCID-ms2r-94ph-yyh3
27
vulnerability VCID-n57n-cymy-z7dr
28
vulnerability VCID-nvzd-v3bs-6qek
29
vulnerability VCID-ph5u-5j8n-4qah
30
vulnerability VCID-pwn6-j8vf-rufk
31
vulnerability VCID-q229-ag6u-u3hv
32
vulnerability VCID-qbpd-star-6fgn
33
vulnerability VCID-qdcn-2u3v-b3cv
34
vulnerability VCID-qpux-jh6k-8qhx
35
vulnerability VCID-r7bh-7wur-xffs
36
vulnerability VCID-s73y-y7v7-43cm
37
vulnerability VCID-sh5a-fmna-wffr
38
vulnerability VCID-syz5-5y6f-s7er
39
vulnerability VCID-t1fk-cbsx-j3gh
40
vulnerability VCID-t4gn-9fw8-gkc3
41
vulnerability VCID-t8t6-9wa3-aub7
42
vulnerability VCID-t9p4-2x7v-yfaq
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-wgma-bycg-1qb1
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xzay-sjpy-3yce
49
vulnerability VCID-y32p-52ps-4ug4
50
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.76.0
aliases CVE-2021-22876
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6
27
url VCID-gnx2-djyk-uyaf
vulnerability_id VCID-gnx2-djyk-uyaf
summary
Cookie injection with none file
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle does not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48985
published_at 2026-04-12T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-02T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48991
published_at 2026-04-13T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48944
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48998
published_at 2026-04-08T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48995
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49012
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2148242
reference_id
reference_type
scores
url https://hackerone.com/reports/2148242
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
reference_id 2241938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
7
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
8
reference_url http://seclists.org/fulldisclosure/2024/Jan/37
reference_id 37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/37
9
reference_url http://seclists.org/fulldisclosure/2024/Jan/38
reference_id 38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/38
10
reference_url https://security.archlinux.org/AVG-2845
reference_id AVG-2845
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2845
11
reference_url https://security.archlinux.org/AVG-2846
reference_id AVG-2846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2846
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
reference_id CVE-2023-38546
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
13
reference_url https://curl.se/docs/CVE-2023-38546.html
reference_id CVE-2023-38546.HTML
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://curl.se/docs/CVE-2023-38546.html
14
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
15
reference_url https://support.apple.com/kb/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214036
16
reference_url https://support.apple.com/kb/HT214057
reference_id HT214057
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214057
17
reference_url https://support.apple.com/kb/HT214058
reference_id HT214058
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214058
18
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214063
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
reference_id OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
20
reference_url https://access.redhat.com/errata/RHSA-2023:5700
reference_id RHSA-2023:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5700
21
reference_url https://access.redhat.com/errata/RHSA-2023:5763
reference_id RHSA-2023:5763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5763
22
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
23
reference_url https://access.redhat.com/errata/RHSA-2023:6745
reference_id RHSA-2023:6745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6745
24
reference_url https://access.redhat.com/errata/RHSA-2023:7540
reference_id RHSA-2023:7540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7540
25
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
26
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
27
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
28
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
29
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
30
reference_url https://access.redhat.com/errata/RHSA-2024:2101
reference_id RHSA-2024:2101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2101
31
reference_url https://usn.ubuntu.com/6429-1/
reference_id USN-6429-1
reference_type
scores
url https://usn.ubuntu.com/6429-1/
32
reference_url https://usn.ubuntu.com/6429-2/
reference_id USN-6429-2
reference_type
scores
url https://usn.ubuntu.com/6429-2/
33
reference_url https://usn.ubuntu.com/6429-3/
reference_id USN-6429-3
reference_type
scores
url https://usn.ubuntu.com/6429-3/
34
reference_url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
reference_id viewtopic.php?f=8&t=8868
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
fixed_packages
0
url pkg:generic/curl.se/curl@8.4.0
purl pkg:generic/curl.se/curl@8.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-etzn-uhck-h7b2
7
vulnerability VCID-hrsy-694u-2fec
8
vulnerability VCID-mkyr-w79c-qqfz
9
vulnerability VCID-nvzd-v3bs-6qek
10
vulnerability VCID-pwn6-j8vf-rufk
11
vulnerability VCID-qdcn-2u3v-b3cv
12
vulnerability VCID-qpux-jh6k-8qhx
13
vulnerability VCID-t9p4-2x7v-yfaq
14
vulnerability VCID-tha5-fv3w-sub6
15
vulnerability VCID-u4bx-xqb3-vuef
16
vulnerability VCID-vbbv-k1r7-kkas
17
vulnerability VCID-wgma-bycg-1qb1
18
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0
aliases CVE-2023-38546
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf
28
url VCID-hrsy-694u-2fec
vulnerability_id VCID-hrsy-694u-2fec
summary curl: OCSP stapling bypass with GnuTLS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8096
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.66593
published_at 2026-04-13T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66562
published_at 2026-04-02T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.66587
published_at 2026-04-04T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66559
published_at 2026-04-07T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66606
published_at 2026-04-08T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.6662
published_at 2026-04-09T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-11T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2310519
reference_id 2310519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2310519
5
reference_url https://hackerone.com/reports/2669852
reference_id 2669852
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://hackerone.com/reports/2669852
6
reference_url https://curl.se/docs/CVE-2024-8096.html
reference_id CVE-2024-8096.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://curl.se/docs/CVE-2024-8096.html
7
reference_url https://curl.se/docs/CVE-2024-8096.json
reference_id CVE-2024-8096.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://curl.se/docs/CVE-2024-8096.json
8
reference_url https://usn.ubuntu.com/7012-1/
reference_id USN-7012-1
reference_type
scores
url https://usn.ubuntu.com/7012-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.10.0
purl pkg:generic/curl.se/curl@8.10.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-9mjz-apkm-g7h1
6
vulnerability VCID-etzn-uhck-h7b2
7
vulnerability VCID-kt4b-7ffh-4bch
8
vulnerability VCID-mkyr-w79c-qqfz
9
vulnerability VCID-nvzd-v3bs-6qek
10
vulnerability VCID-pwn6-j8vf-rufk
11
vulnerability VCID-qpux-jh6k-8qhx
12
vulnerability VCID-t9p4-2x7v-yfaq
13
vulnerability VCID-vbbv-k1r7-kkas
14
vulnerability VCID-wgma-bycg-1qb1
15
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.10.0
aliases CVE-2024-8096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec
29
url VCID-hudt-78dw-tkf2
vulnerability_id VCID-hudt-78dw-tkf2
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5489
published_at 2026-04-01T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.55017
published_at 2026-04-11T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.55005
published_at 2026-04-09T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55006
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54956
published_at 2026-04-07T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.5496
published_at 2026-04-02T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-04T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-13T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62194
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
2
reference_url https://curl.se/docs/CVE-2021-22925.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22925.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1223882
reference_id
reference_type
scores
url https://hackerone.com/reports/1223882
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
reference_id 1970902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
6
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
7
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
8
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
9
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
10
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
11
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
12
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
13
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
14
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
15
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
16
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
17
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
18
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
19
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
20
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
21
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
22
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22925
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2
30
url VCID-ju6h-a1sz-f7e5
vulnerability_id VCID-ju6h-a1sz-f7e5
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8285
reference_id
reference_type
scores
0
value 0.00742
scoring_system epss
scoring_elements 0.7291
published_at 2026-04-01T12:55:00Z
1
value 0.00742
scoring_system epss
scoring_elements 0.72967
published_at 2026-04-13T12:55:00Z
2
value 0.00742
scoring_system epss
scoring_elements 0.72968
published_at 2026-04-09T12:55:00Z
3
value 0.00742
scoring_system epss
scoring_elements 0.72994
published_at 2026-04-11T12:55:00Z
4
value 0.00742
scoring_system epss
scoring_elements 0.72973
published_at 2026-04-12T12:55:00Z
5
value 0.00742
scoring_system epss
scoring_elements 0.72922
published_at 2026-04-02T12:55:00Z
6
value 0.00742
scoring_system epss
scoring_elements 0.72942
published_at 2026-04-04T12:55:00Z
7
value 0.00742
scoring_system epss
scoring_elements 0.72917
published_at 2026-04-07T12:55:00Z
8
value 0.00742
scoring_system epss
scoring_elements 0.72955
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8285
2
reference_url https://curl.se/docs/CVE-2020-8285.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8285.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1045844
reference_id
reference_type
scores
url https://hackerone.com/reports/1045844
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1902687
reference_id 1902687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1902687
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162
reference_id 977162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162
15
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8285
reference_id CVE-2020-8285
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8285
17
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
18
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
19
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
20
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
21
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
22
reference_url https://usn.ubuntu.com/4665-2/
reference_id USN-4665-2
reference_type
scores
url https://usn.ubuntu.com/4665-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.74.0
purl pkg:generic/curl.se/curl@7.74.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-bdy2-8gub-tfe6
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-ph5u-5j8n-4qah
31
vulnerability VCID-pwn6-j8vf-rufk
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-s73y-y7v7-43cm
38
vulnerability VCID-sh5a-fmna-wffr
39
vulnerability VCID-syz5-5y6f-s7er
40
vulnerability VCID-t1fk-cbsx-j3gh
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-x57x-w8g8-7ybz
47
vulnerability VCID-xzay-sjpy-3yce
48
vulnerability VCID-y32p-52ps-4ug4
49
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0
aliases CVE-2020-8285
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ju6h-a1sz-f7e5
31
url VCID-mkyr-w79c-qqfz
vulnerability_id VCID-mkyr-w79c-qqfz
summary curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00583
published_at 2026-04-13T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-08T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00595
published_at 2026-04-07T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00587
published_at 2026-04-09T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00586
published_at 2026-04-11T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00582
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
2
reference_url https://curl.se/docs/CVE-2025-14017.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
reference_id 2427870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
6
reference_url https://curl.se/docs/CVE-2025-14017.json
reference_id CVE-2025-14017.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.json
7
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
8
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.18.0
purl pkg:generic/curl.se/curl@8.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-8zks-th64-33b8
2
vulnerability VCID-amgy-dw6h-6ydf
3
vulnerability VCID-etzn-uhck-h7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0
aliases CVE-2025-14017
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz
32
url VCID-ms2r-94ph-yyh3
vulnerability_id VCID-ms2r-94ph-yyh3
summary
Improper Authentication
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27536
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-13T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-02T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.0129
published_at 2026-04-04T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-07T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01306
published_at 2026-04-08T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.0131
published_at 2026-04-09T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01294
published_at 2026-04-11T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01288
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27536
2
reference_url https://curl.se/docs/CVE-2023-27536.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27536.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1895135
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://hackerone.com/reports/1895135
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179092
reference_id 2179092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179092
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27536
reference_id CVE-2023-27536
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27536
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2023:4523
reference_id RHSA-2023:4523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4523
14
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
15
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
16
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
17
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27536
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms2r-94ph-yyh3
33
url VCID-n51k-39uk-auca
vulnerability_id VCID-n51k-39uk-auca
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8286
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-13T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52128
published_at 2026-04-12T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59564
published_at 2026-04-01T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59662
published_at 2026-04-04T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59638
published_at 2026-04-02T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-07T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59683
published_at 2026-04-08T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-09T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59717
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8286
2
reference_url https://curl.se/docs/CVE-2020-8286.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://curl.se/docs/CVE-2020-8286.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1048457
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://hackerone.com/reports/1048457
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906096
reference_id 1906096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906096
14
reference_url http://seclists.org/fulldisclosure/2021/Apr/50
reference_id 50
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/50
15
reference_url http://seclists.org/fulldisclosure/2021/Apr/51
reference_id 51
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/51
16
reference_url http://seclists.org/fulldisclosure/2021/Apr/54
reference_id 54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/54
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161
reference_id 977161
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161
18
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8286
reference_id CVE-2020-8286
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8286
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
reference_id DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
21
reference_url https://www.debian.org/security/2021/dsa-4881
reference_id dsa-4881
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://www.debian.org/security/2021/dsa-4881
22
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://security.gentoo.org/glsa/202012-14
23
reference_url https://support.apple.com/kb/HT212325
reference_id HT212325
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212325
24
reference_url https://support.apple.com/kb/HT212326
reference_id HT212326
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212326
25
reference_url https://support.apple.com/kb/HT212327
reference_id HT212327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212327
26
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
27
reference_url https://security.netapp.com/advisory/ntap-20210122-0007/
reference_id ntap-20210122-0007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://security.netapp.com/advisory/ntap-20210122-0007/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
reference_id NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
29
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
30
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
31
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
32
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
reference_id ssa-200951.pdf
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
33
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.74.0
purl pkg:generic/curl.se/curl@7.74.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-bdy2-8gub-tfe6
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-ph5u-5j8n-4qah
31
vulnerability VCID-pwn6-j8vf-rufk
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-s73y-y7v7-43cm
38
vulnerability VCID-sh5a-fmna-wffr
39
vulnerability VCID-syz5-5y6f-s7er
40
vulnerability VCID-t1fk-cbsx-j3gh
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-x57x-w8g8-7ybz
47
vulnerability VCID-xzay-sjpy-3yce
48
vulnerability VCID-y32p-52ps-4ug4
49
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0
aliases CVE-2020-8286
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n51k-39uk-auca
34
url VCID-n57n-cymy-z7dr
vulnerability_id VCID-n57n-cymy-z7dr
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23916
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25905
published_at 2026-04-13T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.2611
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25948
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25999
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.26009
published_at 2026-04-11T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23916
2
reference_url https://curl.se/docs/CVE-2023-23916.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-23916.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1826048
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://hackerone.com/reports/1826048
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
reference_id 1031371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167815
reference_id 2167815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167815
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
reference_id BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
9
reference_url https://www.debian.org/security/2023/dsa-5365
reference_id dsa-5365
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://www.debian.org/security/2023/dsa-5365
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html
12
reference_url https://security.netapp.com/advisory/ntap-20230309-0006/
reference_id ntap-20230309-0006
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://security.netapp.com/advisory/ntap-20230309-0006/
13
reference_url https://access.redhat.com/errata/RHSA-2023:1140
reference_id RHSA-2023:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1140
14
reference_url https://access.redhat.com/errata/RHSA-2023:1701
reference_id RHSA-2023:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1701
15
reference_url https://access.redhat.com/errata/RHSA-2023:1842
reference_id RHSA-2023:1842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1842
16
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
17
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
18
reference_url https://access.redhat.com/errata/RHSA-2023:3460
reference_id RHSA-2023:3460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3460
19
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
20
reference_url https://usn.ubuntu.com/5891-1/
reference_id USN-5891-1
reference_type
scores
url https://usn.ubuntu.com/5891-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.88.0
purl pkg:generic/curl.se/curl@7.88.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-7srk-hshe-h3f4
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-arjz-67yz-wkg9
9
vulnerability VCID-bz4u-6rft-s3a8
10
vulnerability VCID-cbah-e86c-w3fj
11
vulnerability VCID-ddgz-rczw-jqfw
12
vulnerability VCID-etzn-uhck-h7b2
13
vulnerability VCID-gnx2-djyk-uyaf
14
vulnerability VCID-hrsy-694u-2fec
15
vulnerability VCID-ke81-x2ze-rbc5
16
vulnerability VCID-m15r-v9sr-2bbn
17
vulnerability VCID-mkyr-w79c-qqfz
18
vulnerability VCID-ms2r-94ph-yyh3
19
vulnerability VCID-nvzd-v3bs-6qek
20
vulnerability VCID-pwn6-j8vf-rufk
21
vulnerability VCID-qdcn-2u3v-b3cv
22
vulnerability VCID-qpux-jh6k-8qhx
23
vulnerability VCID-s73y-y7v7-43cm
24
vulnerability VCID-syz5-5y6f-s7er
25
vulnerability VCID-t9p4-2x7v-yfaq
26
vulnerability VCID-tcqe-7skm-b3fz
27
vulnerability VCID-tha5-fv3w-sub6
28
vulnerability VCID-u4bx-xqb3-vuef
29
vulnerability VCID-vbbv-k1r7-kkas
30
vulnerability VCID-wgma-bycg-1qb1
31
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.88.0
aliases CVE-2023-23916
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n57n-cymy-z7dr
35
url VCID-nvzd-v3bs-6qek
vulnerability_id VCID-nvzd-v3bs-6qek
summary When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-15079
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10366
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-02T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10388
published_at 2026-04-12T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10428
published_at 2026-04-11T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10399
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10333
published_at 2026-04-08T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10359
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-15079
2
reference_url https://curl.se/docs/CVE-2025-15079.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://curl.se/docs/CVE-2025-15079.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3477116
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://hackerone.com/reports/3477116
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426409
reference_id 2426409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426409
7
reference_url https://curl.se/docs/CVE-2025-15079.json
reference_id CVE-2025-15079.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://curl.se/docs/CVE-2025-15079.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
9
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.18.0
purl pkg:generic/curl.se/curl@8.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-8zks-th64-33b8
2
vulnerability VCID-amgy-dw6h-6ydf
3
vulnerability VCID-etzn-uhck-h7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0
aliases CVE-2025-15079
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek
36
url VCID-ph5u-5j8n-4qah
vulnerability_id VCID-ph5u-5j8n-4qah
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31806
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31977
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31797
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31879
published_at 2026-04-09T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31882
published_at 2026-04-11T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31843
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
2
reference_url https://curl.se/docs/CVE-2021-22898.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22898.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1176461
reference_id
reference_type
scores
url https://hackerone.com/reports/1176461
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
reference_id 1964887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
reference_id 989228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
22
reference_url https://security.archlinux.org/ASA-202106-4
reference_id ASA-202106-4
reference_type
scores
url https://security.archlinux.org/ASA-202106-4
23
reference_url https://security.archlinux.org/ASA-202106-5
reference_id ASA-202106-5
reference_type
scores
url https://security.archlinux.org/ASA-202106-5
24
reference_url https://security.archlinux.org/ASA-202106-6
reference_id ASA-202106-6
reference_type
scores
url https://security.archlinux.org/ASA-202106-6
25
reference_url https://security.archlinux.org/ASA-202106-7
reference_id ASA-202106-7
reference_type
scores
url https://security.archlinux.org/ASA-202106-7
26
reference_url https://security.archlinux.org/ASA-202106-8
reference_id ASA-202106-8
reference_type
scores
url https://security.archlinux.org/ASA-202106-8
27
reference_url https://security.archlinux.org/ASA-202106-9
reference_id ASA-202106-9
reference_type
scores
url https://security.archlinux.org/ASA-202106-9
28
reference_url https://security.archlinux.org/AVG-1995
reference_id AVG-1995
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1995
29
reference_url https://security.archlinux.org/AVG-1996
reference_id AVG-1996
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1996
30
reference_url https://security.archlinux.org/AVG-1997
reference_id AVG-1997
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1997
31
reference_url https://security.archlinux.org/AVG-1998
reference_id AVG-1998
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1998
32
reference_url https://security.archlinux.org/AVG-1999
reference_id AVG-1999
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1999
33
reference_url https://security.archlinux.org/AVG-2000
reference_id AVG-2000
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2000
34
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
url https://security.gentoo.org/glsa/202105-36
35
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
36
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
37
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
38
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.77.0
purl pkg:generic/curl.se/curl@7.77.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-6we4-n888-6qhe
9
vulnerability VCID-75nw-4e2d-zqgg
10
vulnerability VCID-7srk-hshe-h3f4
11
vulnerability VCID-8zks-th64-33b8
12
vulnerability VCID-9ggp-5wfj-ufcq
13
vulnerability VCID-9nak-pscy-e7gs
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-bdy2-8gub-tfe6
17
vulnerability VCID-cbah-e86c-w3fj
18
vulnerability VCID-dc3c-3wab-57gh
19
vulnerability VCID-ddgz-rczw-jqfw
20
vulnerability VCID-ej47-4dcu-5fhy
21
vulnerability VCID-etzn-uhck-h7b2
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-pwn6-j8vf-rufk
31
vulnerability VCID-q229-ag6u-u3hv
32
vulnerability VCID-qbpd-star-6fgn
33
vulnerability VCID-qdcn-2u3v-b3cv
34
vulnerability VCID-qpux-jh6k-8qhx
35
vulnerability VCID-r7bh-7wur-xffs
36
vulnerability VCID-s73y-y7v7-43cm
37
vulnerability VCID-sh5a-fmna-wffr
38
vulnerability VCID-syz5-5y6f-s7er
39
vulnerability VCID-t1fk-cbsx-j3gh
40
vulnerability VCID-t4gn-9fw8-gkc3
41
vulnerability VCID-t8t6-9wa3-aub7
42
vulnerability VCID-t9p4-2x7v-yfaq
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-wgma-bycg-1qb1
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xpss-yndr-mycj
49
vulnerability VCID-xzay-sjpy-3yce
50
vulnerability VCID-y32p-52ps-4ug4
51
vulnerability VCID-y4x5-n5m2-x7bq
52
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.77.0
aliases CVE-2021-22898
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah
37
url VCID-q229-ag6u-u3hv
vulnerability_id VCID-q229-ag6u-u3hv
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22576
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50613
published_at 2026-04-04T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-13T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.5669
published_at 2026-04-12T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58012
published_at 2026-04-09T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.57955
published_at 2026-04-07T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.5801
published_at 2026-04-08T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22576
2
reference_url https://curl.se/docs/CVE-2022-22576.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-22576.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1526328
reference_id
reference_type
scores
url https://hackerone.com/reports/1526328
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295
reference_id 1010295
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077541
reference_id 2077541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077541
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
25
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
26
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.0
purl pkg:generic/curl.se/curl@7.83.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-47qb-2qkw-1qej
4
vulnerability VCID-4e1k-7bj9-hfch
5
vulnerability VCID-4gze-cwtp-2bgr
6
vulnerability VCID-6ge5-86tg-dydf
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hjkx-6yep-mkde
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-m15r-v9sr-2bbn
24
vulnerability VCID-mkyr-w79c-qqfz
25
vulnerability VCID-ms2r-94ph-yyh3
26
vulnerability VCID-n57n-cymy-z7dr
27
vulnerability VCID-nvzd-v3bs-6qek
28
vulnerability VCID-pwn6-j8vf-rufk
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-rhxh-77pj-1bfy
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-syz5-5y6f-s7er
34
vulnerability VCID-t1fk-cbsx-j3gh
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-v9n1-d6xt-6ubn
39
vulnerability VCID-vbbv-k1r7-kkas
40
vulnerability VCID-wgma-bycg-1qb1
41
vulnerability VCID-x57x-w8g8-7ybz
42
vulnerability VCID-xpss-yndr-mycj
43
vulnerability VCID-xzay-sjpy-3yce
44
vulnerability VCID-y4x5-n5m2-x7bq
45
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0
aliases CVE-2022-22576
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv
38
url VCID-qbpd-star-6fgn
vulnerability_id VCID-qbpd-star-6fgn
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25873
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25782
published_at 2026-04-13T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25937
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25978
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25745
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25816
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25879
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25838
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
2
reference_url https://curl.se/docs/CVE-2021-22923.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22923.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213181
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://hackerone.com/reports/1213181
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
reference_id 1981438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
12
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
13
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22923
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn
39
url VCID-qdcn-2u3v-b3cv
vulnerability_id VCID-qdcn-2u3v-b3cv
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46218
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60591
published_at 2026-04-13T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60627
published_at 2026-04-11T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60612
published_at 2026-04-12T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62672
published_at 2026-04-09T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62606
published_at 2026-04-07T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62656
published_at 2026-04-08T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62641
published_at 2026-04-04T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62608
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46218
2
reference_url https://curl.se/docs/CVE-2023-46218.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-46218.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2212193
reference_id
reference_type
scores
url https://hackerone.com/reports/2212193
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646
reference_id 1057646
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252030
reference_id 2252030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252030
8
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
9
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
10
reference_url https://access.redhat.com/errata/RHSA-2024:0434
reference_id RHSA-2024:0434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0434
11
reference_url https://access.redhat.com/errata/RHSA-2024:0452
reference_id RHSA-2024:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0452
12
reference_url https://access.redhat.com/errata/RHSA-2024:0585
reference_id RHSA-2024:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0585
13
reference_url https://access.redhat.com/errata/RHSA-2024:1129
reference_id RHSA-2024:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1129
14
reference_url https://access.redhat.com/errata/RHSA-2024:1316
reference_id RHSA-2024:1316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1316
15
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
16
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
17
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
18
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
19
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
20
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
21
reference_url https://usn.ubuntu.com/6535-1/
reference_id USN-6535-1
reference_type
scores
url https://usn.ubuntu.com/6535-1/
22
reference_url https://usn.ubuntu.com/6641-1/
reference_id USN-6641-1
reference_type
scores
url https://usn.ubuntu.com/6641-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.5.0
purl pkg:generic/curl.se/curl@8.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2vwu-y316-gbb2
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-b69q-9yrr-myf7
8
vulnerability VCID-etzn-uhck-h7b2
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qpux-jh6k-8qhx
14
vulnerability VCID-t9p4-2x7v-yfaq
15
vulnerability VCID-tha5-fv3w-sub6
16
vulnerability VCID-u4bx-xqb3-vuef
17
vulnerability VCID-vbbv-k1r7-kkas
18
vulnerability VCID-wgma-bycg-1qb1
19
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.5.0
aliases CVE-2023-46218
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv
40
url VCID-qpfa-s6sd-8yct
vulnerability_id VCID-qpfa-s6sd-8yct
summary curl: Windows OpenSSL engine code injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5443
reference_id
reference_type
scores
0
value 0.00953
scoring_system epss
scoring_elements 0.76346
published_at 2026-04-01T12:55:00Z
1
value 0.00953
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-02T12:55:00Z
2
value 0.00953
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-04T12:55:00Z
3
value 0.00953
scoring_system epss
scoring_elements 0.76359
published_at 2026-04-07T12:55:00Z
4
value 0.00953
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-08T12:55:00Z
5
value 0.00953
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-09T12:55:00Z
6
value 0.00953
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-11T12:55:00Z
7
value 0.00953
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-12T12:55:00Z
8
value 0.00953
scoring_system epss
scoring_elements 0.76404
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5443
2
reference_url https://curl.se/docs/CVE-2019-5443.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5443.html
3
reference_url https://hackerone.com/reports/608577
reference_id
reference_type
scores
url https://hackerone.com/reports/608577
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1772100
reference_id 1772100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1772100
fixed_packages
0
url pkg:generic/curl.se/curl@7.66.0
purl pkg:generic/curl.se/curl@7.66.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-cp4n-p2z3-43b4
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-j5s3-rr74-nqb8
26
vulnerability VCID-ju6h-a1sz-f7e5
27
vulnerability VCID-mkyr-w79c-qqfz
28
vulnerability VCID-ms2r-94ph-yyh3
29
vulnerability VCID-n51k-39uk-auca
30
vulnerability VCID-n57n-cymy-z7dr
31
vulnerability VCID-nvzd-v3bs-6qek
32
vulnerability VCID-ph5u-5j8n-4qah
33
vulnerability VCID-q229-ag6u-u3hv
34
vulnerability VCID-qbpd-star-6fgn
35
vulnerability VCID-qdcn-2u3v-b3cv
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-rmez-cwu2-2ya7
38
vulnerability VCID-s73y-y7v7-43cm
39
vulnerability VCID-sh5a-fmna-wffr
40
vulnerability VCID-syz5-5y6f-s7er
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-u4bx-xqb3-vuef
44
vulnerability VCID-vbbv-k1r7-kkas
45
vulnerability VCID-x57x-w8g8-7ybz
46
vulnerability VCID-xzay-sjpy-3yce
47
vulnerability VCID-y32p-52ps-4ug4
48
vulnerability VCID-y4x5-n5m2-x7bq
49
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.66.0
aliases CVE-2019-5443
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct
41
url VCID-r7bh-7wur-xffs
vulnerability_id VCID-r7bh-7wur-xffs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
reference_id
reference_type
scores
0
value 0.00682
scoring_system epss
scoring_elements 0.71604
published_at 2026-04-13T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.71574
published_at 2026-04-02T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71592
published_at 2026-04-04T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-07T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71605
published_at 2026-04-08T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-09T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71639
published_at 2026-04-11T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71623
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
2
reference_url https://curl.se/docs/CVE-2022-27776.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27776.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1547048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://hackerone.com/reports/1547048
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
reference_id 1010252
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
reference_id 2078408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
reference_id 7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
23
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
reference_id DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
28
reference_url https://security.netapp.com/advisory/ntap-20220609-0008/
reference_id ntap-20220609-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.netapp.com/advisory/ntap-20220609-0008/
29
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
30
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
31
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.83.0
purl pkg:generic/curl.se/curl@7.83.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-47qb-2qkw-1qej
4
vulnerability VCID-4e1k-7bj9-hfch
5
vulnerability VCID-4gze-cwtp-2bgr
6
vulnerability VCID-6ge5-86tg-dydf
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hjkx-6yep-mkde
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-m15r-v9sr-2bbn
24
vulnerability VCID-mkyr-w79c-qqfz
25
vulnerability VCID-ms2r-94ph-yyh3
26
vulnerability VCID-n57n-cymy-z7dr
27
vulnerability VCID-nvzd-v3bs-6qek
28
vulnerability VCID-pwn6-j8vf-rufk
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-rhxh-77pj-1bfy
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-syz5-5y6f-s7er
34
vulnerability VCID-t1fk-cbsx-j3gh
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-v9n1-d6xt-6ubn
39
vulnerability VCID-vbbv-k1r7-kkas
40
vulnerability VCID-wgma-bycg-1qb1
41
vulnerability VCID-x57x-w8g8-7ybz
42
vulnerability VCID-xpss-yndr-mycj
43
vulnerability VCID-xzay-sjpy-3yce
44
vulnerability VCID-y4x5-n5m2-x7bq
45
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0
aliases CVE-2022-27776
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs
42
url VCID-rmez-cwu2-2ya7
vulnerability_id VCID-rmez-cwu2-2ya7
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28391
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2831
published_at 2026-04-13T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28411
published_at 2026-04-11T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28466
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28508
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28299
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28364
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
2
reference_url https://curl.se/docs/CVE-2020-8284.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8284.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1040166
reference_id
reference_type
scores
url https://hackerone.com/reports/1040166
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
reference_id 1902667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
reference_id 977163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
15
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
16
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
17
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
18
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
19
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
20
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
21
reference_url https://usn.ubuntu.com/4665-2/
reference_id USN-4665-2
reference_type
scores
url https://usn.ubuntu.com/4665-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.74.0
purl pkg:generic/curl.se/curl@7.74.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-bdy2-8gub-tfe6
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-gv7x-j8bz-wycc
24
vulnerability VCID-hrsy-694u-2fec
25
vulnerability VCID-hudt-78dw-tkf2
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n57n-cymy-z7dr
29
vulnerability VCID-nvzd-v3bs-6qek
30
vulnerability VCID-ph5u-5j8n-4qah
31
vulnerability VCID-pwn6-j8vf-rufk
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-s73y-y7v7-43cm
38
vulnerability VCID-sh5a-fmna-wffr
39
vulnerability VCID-syz5-5y6f-s7er
40
vulnerability VCID-t1fk-cbsx-j3gh
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-tcqe-7skm-b3fz
44
vulnerability VCID-u4bx-xqb3-vuef
45
vulnerability VCID-vbbv-k1r7-kkas
46
vulnerability VCID-x57x-w8g8-7ybz
47
vulnerability VCID-xzay-sjpy-3yce
48
vulnerability VCID-y32p-52ps-4ug4
49
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0
aliases CVE-2020-8284
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7
43
url VCID-s73y-y7v7-43cm
vulnerability_id VCID-s73y-y7v7-43cm
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70289
published_at 2026-04-13T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70238
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-04T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-07T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-08T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.70294
published_at 2026-04-09T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70317
published_at 2026-04-11T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
2
reference_url https://curl.se/docs/CVE-2023-28322.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28322.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1954658
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://hackerone.com/reports/1954658
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
reference_id 2196793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
20
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
21
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
22
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
23
reference_url https://access.redhat.com/errata/RHSA-2024:0585
reference_id RHSA-2024:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0585
24
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
25
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
26
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
27
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
28
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:generic/curl.se/curl@8.1.0
purl pkg:generic/curl.se/curl@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-4seq-hvbx-7fg8
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8zks-th64-33b8
6
vulnerability VCID-bz4u-6rft-s3a8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-gnx2-djyk-uyaf
9
vulnerability VCID-hrsy-694u-2fec
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qdcn-2u3v-b3cv
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-t9p4-2x7v-yfaq
16
vulnerability VCID-tcqe-7skm-b3fz
17
vulnerability VCID-tha5-fv3w-sub6
18
vulnerability VCID-u4bx-xqb3-vuef
19
vulnerability VCID-vbbv-k1r7-kkas
20
vulnerability VCID-wgma-bycg-1qb1
21
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0
aliases CVE-2023-28322
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm
44
url VCID-sh5a-fmna-wffr
vulnerability_id VCID-sh5a-fmna-wffr
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23143
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-13T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23322
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23227
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23299
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
2
reference_url https://curl.se/docs/CVE-2021-22946.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22946.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334111
reference_id
reference_type
scores
url https://hackerone.com/reports/1334111
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
reference_id 1017589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
reference_id 2003175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
22
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
23
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
24
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
25
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
26
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
27
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
28
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
29
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
30
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
33
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.79.0
purl pkg:generic/curl.se/curl@7.79.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hrsy-694u-2fec
22
vulnerability VCID-mkyr-w79c-qqfz
23
vulnerability VCID-ms2r-94ph-yyh3
24
vulnerability VCID-n57n-cymy-z7dr
25
vulnerability VCID-nvzd-v3bs-6qek
26
vulnerability VCID-pwn6-j8vf-rufk
27
vulnerability VCID-q229-ag6u-u3hv
28
vulnerability VCID-qdcn-2u3v-b3cv
29
vulnerability VCID-qpux-jh6k-8qhx
30
vulnerability VCID-r7bh-7wur-xffs
31
vulnerability VCID-s73y-y7v7-43cm
32
vulnerability VCID-syz5-5y6f-s7er
33
vulnerability VCID-t1fk-cbsx-j3gh
34
vulnerability VCID-t8t6-9wa3-aub7
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-vbbv-k1r7-kkas
39
vulnerability VCID-wgma-bycg-1qb1
40
vulnerability VCID-x57x-w8g8-7ybz
41
vulnerability VCID-xpss-yndr-mycj
42
vulnerability VCID-xzay-sjpy-3yce
43
vulnerability VCID-y4x5-n5m2-x7bq
44
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.79.0
aliases CVE-2021-22946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr
45
url VCID-syz5-5y6f-s7er
vulnerability_id VCID-syz5-5y6f-s7er
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27534
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19904
published_at 2026-04-13T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20007
published_at 2026-04-11T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19963
published_at 2026-04-12T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20068
published_at 2026-04-02T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20126
published_at 2026-04-04T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19854
published_at 2026-04-07T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19933
published_at 2026-04-08T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19988
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27534
2
reference_url https://curl.se/docs/CVE-2023-27534.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27534.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1892351
reference_id
reference_type
scores
url https://hackerone.com/reports/1892351
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179069
reference_id 2179069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179069
7
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
8
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
9
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
10
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
11
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.0.0
purl pkg:generic/curl.se/curl@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-47qb-2qkw-1qej
2
vulnerability VCID-4seq-hvbx-7fg8
3
vulnerability VCID-5xp7-mcsa-uqd4
4
vulnerability VCID-6we4-n888-6qhe
5
vulnerability VCID-75nw-4e2d-zqgg
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-bz4u-6rft-s3a8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-gnx2-djyk-uyaf
11
vulnerability VCID-hrsy-694u-2fec
12
vulnerability VCID-m15r-v9sr-2bbn
13
vulnerability VCID-mkyr-w79c-qqfz
14
vulnerability VCID-nvzd-v3bs-6qek
15
vulnerability VCID-pwn6-j8vf-rufk
16
vulnerability VCID-qdcn-2u3v-b3cv
17
vulnerability VCID-qpux-jh6k-8qhx
18
vulnerability VCID-s73y-y7v7-43cm
19
vulnerability VCID-t9p4-2x7v-yfaq
20
vulnerability VCID-tcqe-7skm-b3fz
21
vulnerability VCID-tha5-fv3w-sub6
22
vulnerability VCID-u4bx-xqb3-vuef
23
vulnerability VCID-vbbv-k1r7-kkas
24
vulnerability VCID-wgma-bycg-1qb1
25
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0
aliases CVE-2023-27534
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-5y6f-s7er
46
url VCID-t4gn-9fw8-gkc3
vulnerability_id VCID-t4gn-9fw8-gkc3
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.486
published_at 2026-04-01T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48669
published_at 2026-04-13T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48641
published_at 2026-04-02T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48662
published_at 2026-04-04T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48614
published_at 2026-04-07T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48668
published_at 2026-04-08T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48665
published_at 2026-04-09T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48683
published_at 2026-04-11T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48657
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
2
reference_url https://curl.se/docs/CVE-2021-22947.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22947.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334763
reference_id
reference_type
scores
url https://hackerone.com/reports/1334763
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
reference_id 2003191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
21
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
22
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
23
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
24
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
25
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
26
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
27
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
28
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
29
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
30
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
31
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
32
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.79.0
purl pkg:generic/curl.se/curl@7.79.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-cbah-e86c-w3fj
16
vulnerability VCID-ddgz-rczw-jqfw
17
vulnerability VCID-ej47-4dcu-5fhy
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-gnx2-djyk-uyaf
20
vulnerability VCID-gv7x-j8bz-wycc
21
vulnerability VCID-hrsy-694u-2fec
22
vulnerability VCID-mkyr-w79c-qqfz
23
vulnerability VCID-ms2r-94ph-yyh3
24
vulnerability VCID-n57n-cymy-z7dr
25
vulnerability VCID-nvzd-v3bs-6qek
26
vulnerability VCID-pwn6-j8vf-rufk
27
vulnerability VCID-q229-ag6u-u3hv
28
vulnerability VCID-qdcn-2u3v-b3cv
29
vulnerability VCID-qpux-jh6k-8qhx
30
vulnerability VCID-r7bh-7wur-xffs
31
vulnerability VCID-s73y-y7v7-43cm
32
vulnerability VCID-syz5-5y6f-s7er
33
vulnerability VCID-t1fk-cbsx-j3gh
34
vulnerability VCID-t8t6-9wa3-aub7
35
vulnerability VCID-t9p4-2x7v-yfaq
36
vulnerability VCID-tcqe-7skm-b3fz
37
vulnerability VCID-u4bx-xqb3-vuef
38
vulnerability VCID-vbbv-k1r7-kkas
39
vulnerability VCID-wgma-bycg-1qb1
40
vulnerability VCID-x57x-w8g8-7ybz
41
vulnerability VCID-xpss-yndr-mycj
42
vulnerability VCID-xzay-sjpy-3yce
43
vulnerability VCID-y4x5-n5m2-x7bq
44
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.79.0
aliases CVE-2021-22947
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3
47
url VCID-u4bx-xqb3-vuef
vulnerability_id VCID-u4bx-xqb3-vuef
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2398
reference_id
reference_type
scores
0
value 0.01962
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-13T12:55:00Z
1
value 0.01962
scoring_system epss
scoring_elements 0.83457
published_at 2026-04-02T12:55:00Z
2
value 0.01962
scoring_system epss
scoring_elements 0.83472
published_at 2026-04-04T12:55:00Z
3
value 0.01962
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-07T12:55:00Z
4
value 0.01962
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-08T12:55:00Z
5
value 0.01962
scoring_system epss
scoring_elements 0.83504
published_at 2026-04-09T12:55:00Z
6
value 0.01962
scoring_system epss
scoring_elements 0.83519
published_at 2026-04-11T12:55:00Z
7
value 0.01962
scoring_system epss
scoring_elements 0.83512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/19
reference_id 19
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/19
6
reference_url http://seclists.org/fulldisclosure/2024/Jul/20
reference_id 20
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/20
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270498
reference_id 2270498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270498
8
reference_url https://hackerone.com/reports/2402845
reference_id 2402845
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://hackerone.com/reports/2402845
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
reference_id 2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
10
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/3
reference_id 3
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://www.openwall.com/lists/oss-security/2024/03/27/3
11
reference_url https://curl.se/docs/CVE-2024-2398.html
reference_id CVE-2024-2398.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://curl.se/docs/CVE-2024-2398.html
12
reference_url https://curl.se/docs/CVE-2024-2398.json
reference_id CVE-2024-2398.json
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://curl.se/docs/CVE-2024-2398.json
13
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
reference_id GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
15
reference_url https://support.apple.com/kb/HT214118
reference_id HT214118
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214118
16
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214119
17
reference_url https://support.apple.com/kb/HT214120
reference_id HT214120
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214120
18
reference_url https://security.netapp.com/advisory/ntap-20240503-0009/
reference_id ntap-20240503-0009
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://security.netapp.com/advisory/ntap-20240503-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
20
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
21
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
22
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
23
reference_url https://access.redhat.com/errata/RHSA-2024:3998
reference_id RHSA-2024:3998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3998
24
reference_url https://access.redhat.com/errata/RHSA-2024:5529
reference_id RHSA-2024:5529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5529
25
reference_url https://access.redhat.com/errata/RHSA-2024:5654
reference_id RHSA-2024:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5654
26
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
27
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
28
reference_url https://usn.ubuntu.com/6718-1/
reference_id USN-6718-1
reference_type
scores
url https://usn.ubuntu.com/6718-1/
29
reference_url https://usn.ubuntu.com/6718-2/
reference_id USN-6718-2
reference_type
scores
url https://usn.ubuntu.com/6718-2/
30
reference_url https://usn.ubuntu.com/6718-3/
reference_id USN-6718-3
reference_type
scores
url https://usn.ubuntu.com/6718-3/
fixed_packages
0
url pkg:generic/curl.se/curl@8.7.0
purl pkg:generic/curl.se/curl@8.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-176a-agbw-hqdy
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-75nw-4e2d-zqgg
5
vulnerability VCID-8m6a-ej6a-g3df
6
vulnerability VCID-8zks-th64-33b8
7
vulnerability VCID-etzn-uhck-h7b2
8
vulnerability VCID-hrsy-694u-2fec
9
vulnerability VCID-mkyr-w79c-qqfz
10
vulnerability VCID-nvzd-v3bs-6qek
11
vulnerability VCID-pwn6-j8vf-rufk
12
vulnerability VCID-qpux-jh6k-8qhx
13
vulnerability VCID-t9p4-2x7v-yfaq
14
vulnerability VCID-vbbv-k1r7-kkas
15
vulnerability VCID-wgma-bycg-1qb1
16
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.7.0
aliases CVE-2024-2398
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef
48
url VCID-v3qf-6wju-1bg8
vulnerability_id VCID-v3qf-6wju-1bg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16890
reference_id
reference_type
scores
0
value 0.01397
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-01T12:55:00Z
1
value 0.01397
scoring_system epss
scoring_elements 0.80398
published_at 2026-04-13T12:55:00Z
2
value 0.01397
scoring_system epss
scoring_elements 0.80353
published_at 2026-04-02T12:55:00Z
3
value 0.01397
scoring_system epss
scoring_elements 0.80373
published_at 2026-04-04T12:55:00Z
4
value 0.01397
scoring_system epss
scoring_elements 0.80362
published_at 2026-04-07T12:55:00Z
5
value 0.01397
scoring_system epss
scoring_elements 0.80391
published_at 2026-04-08T12:55:00Z
6
value 0.01397
scoring_system epss
scoring_elements 0.80402
published_at 2026-04-09T12:55:00Z
7
value 0.01397
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-11T12:55:00Z
8
value 0.01397
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16890
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2018-16890.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2018-16890.html
5
reference_url https://curl.se/docs/CVE-2018-16890.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16890.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS
13
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
15
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
16
reference_url http://www.securityfocus.com/bid/106947
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106947
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670252
reference_id 1670252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670252
18
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
19
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
20
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
21
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
22
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
23
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
24
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
25
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
26
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
27
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-16890
reference_id CVE-2018-16890
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-16890
43
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
44
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.64.0
purl pkg:generic/curl.se/curl@7.64.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-ac6r-spds-qbf5
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-cp4n-p2z3-43b4
18
vulnerability VCID-d3s1-3qs7-2uhw
19
vulnerability VCID-dc3c-3wab-57gh
20
vulnerability VCID-ddgz-rczw-jqfw
21
vulnerability VCID-dhrf-2sz5-3bhf
22
vulnerability VCID-etzn-uhck-h7b2
23
vulnerability VCID-frgg-29yv-dyf7
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-vbbv-k1r7-kkas
48
vulnerability VCID-wwam-tcmv-kqhc
49
vulnerability VCID-x57x-w8g8-7ybz
50
vulnerability VCID-xzay-sjpy-3yce
51
vulnerability VCID-y32p-52ps-4ug4
52
vulnerability VCID-y4x5-n5m2-x7bq
53
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.64.0
aliases CVE-2018-16890
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3qf-6wju-1bg8
49
url VCID-vbbv-k1r7-kkas
vulnerability_id VCID-vbbv-k1r7-kkas
summary When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-15224
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.2447
published_at 2026-04-13T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24629
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-12T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.2457
published_at 2026-04-11T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24554
published_at 2026-04-09T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.2451
published_at 2026-04-08T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-15224
2
reference_url https://curl.se/docs/CVE-2025-15224.html
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://curl.se/docs/CVE-2025-15224.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3480925
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://hackerone.com/reports/3480925
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426410
reference_id 2426410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426410
7
reference_url https://curl.se/docs/CVE-2025-15224.json
reference_id CVE-2025-15224.json
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://curl.se/docs/CVE-2025-15224.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
9
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:generic/curl.se/curl@8.18.0
purl pkg:generic/curl.se/curl@8.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-8zks-th64-33b8
2
vulnerability VCID-amgy-dw6h-6ydf
3
vulnerability VCID-etzn-uhck-h7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0
aliases CVE-2025-15224
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas
50
url VCID-w8ks-xk66-r3fm
vulnerability_id VCID-w8ks-xk66-r3fm
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3823
reference_id
reference_type
scores
0
value 0.01673
scoring_system epss
scoring_elements 0.82071
published_at 2026-04-01T12:55:00Z
1
value 0.01673
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-13T12:55:00Z
2
value 0.01673
scoring_system epss
scoring_elements 0.82083
published_at 2026-04-02T12:55:00Z
3
value 0.01673
scoring_system epss
scoring_elements 0.82104
published_at 2026-04-04T12:55:00Z
4
value 0.01673
scoring_system epss
scoring_elements 0.821
published_at 2026-04-07T12:55:00Z
5
value 0.01673
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-08T12:55:00Z
6
value 0.01673
scoring_system epss
scoring_elements 0.82134
published_at 2026-04-09T12:55:00Z
7
value 0.01673
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-11T12:55:00Z
8
value 0.01673
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3823
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2019-3823.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-3823.html
5
reference_url https://curl.se/docs/CVE-2019-3823.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-3823.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
15
reference_url http://www.securityfocus.com/bid/106950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106950
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670256
reference_id 1670256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670256
17
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
18
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
19
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
20
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
21
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
22
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
23
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
24
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
25
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
26
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3823
reference_id CVE-2019-3823
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3823
39
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
40
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
41
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.64.0
purl pkg:generic/curl.se/curl@7.64.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2b39-ubrt-hkc6
2
vulnerability VCID-2cx5-1qnw-uufj
3
vulnerability VCID-2xmp-jc8v-bucb
4
vulnerability VCID-3sy2-4f3g-zkac
5
vulnerability VCID-47qb-2qkw-1qej
6
vulnerability VCID-56wg-yafz-gkgx
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-ac6r-spds-qbf5
14
vulnerability VCID-arjz-67yz-wkg9
15
vulnerability VCID-bb2f-7qrm-1kca
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-cp4n-p2z3-43b4
18
vulnerability VCID-d3s1-3qs7-2uhw
19
vulnerability VCID-dc3c-3wab-57gh
20
vulnerability VCID-ddgz-rczw-jqfw
21
vulnerability VCID-dhrf-2sz5-3bhf
22
vulnerability VCID-etzn-uhck-h7b2
23
vulnerability VCID-frgg-29yv-dyf7
24
vulnerability VCID-ggt7-eejg-xfb6
25
vulnerability VCID-gnx2-djyk-uyaf
26
vulnerability VCID-hrsy-694u-2fec
27
vulnerability VCID-hudt-78dw-tkf2
28
vulnerability VCID-j5s3-rr74-nqb8
29
vulnerability VCID-ju6h-a1sz-f7e5
30
vulnerability VCID-mkyr-w79c-qqfz
31
vulnerability VCID-ms2r-94ph-yyh3
32
vulnerability VCID-n51k-39uk-auca
33
vulnerability VCID-n57n-cymy-z7dr
34
vulnerability VCID-nvzd-v3bs-6qek
35
vulnerability VCID-ph5u-5j8n-4qah
36
vulnerability VCID-q229-ag6u-u3hv
37
vulnerability VCID-qbpd-star-6fgn
38
vulnerability VCID-qdcn-2u3v-b3cv
39
vulnerability VCID-qpfa-s6sd-8yct
40
vulnerability VCID-r7bh-7wur-xffs
41
vulnerability VCID-rmez-cwu2-2ya7
42
vulnerability VCID-s73y-y7v7-43cm
43
vulnerability VCID-sh5a-fmna-wffr
44
vulnerability VCID-syz5-5y6f-s7er
45
vulnerability VCID-t4gn-9fw8-gkc3
46
vulnerability VCID-u4bx-xqb3-vuef
47
vulnerability VCID-vbbv-k1r7-kkas
48
vulnerability VCID-wwam-tcmv-kqhc
49
vulnerability VCID-x57x-w8g8-7ybz
50
vulnerability VCID-xzay-sjpy-3yce
51
vulnerability VCID-y32p-52ps-4ug4
52
vulnerability VCID-y4x5-n5m2-x7bq
53
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.64.0
aliases CVE-2019-3823
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ks-xk66-r3fm
51
url VCID-wwam-tcmv-kqhc
vulnerability_id VCID-wwam-tcmv-kqhc
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5482
reference_id
reference_type
scores
0
value 0.06912
scoring_system epss
scoring_elements 0.91402
published_at 2026-04-13T12:55:00Z
1
value 0.06912
scoring_system epss
scoring_elements 0.91403
published_at 2026-04-12T12:55:00Z
2
value 0.08332
scoring_system epss
scoring_elements 0.92281
published_at 2026-04-09T12:55:00Z
3
value 0.08332
scoring_system epss
scoring_elements 0.92277
published_at 2026-04-08T12:55:00Z
4
value 0.08332
scoring_system epss
scoring_elements 0.92286
published_at 2026-04-11T12:55:00Z
5
value 0.08332
scoring_system epss
scoring_elements 0.9225
published_at 2026-04-01T12:55:00Z
6
value 0.08332
scoring_system epss
scoring_elements 0.92257
published_at 2026-04-02T12:55:00Z
7
value 0.08332
scoring_system epss
scoring_elements 0.92262
published_at 2026-04-04T12:55:00Z
8
value 0.08332
scoring_system epss
scoring_elements 0.92265
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5482
4
reference_url https://curl.haxx.se/docs/CVE-2019-5482.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-5482.html
5
reference_url https://curl.se/docs/CVE-2019-5482.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5482.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/684603
reference_id
reference_type
scores
url https://hackerone.com/reports/684603
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
13
reference_url https://seclists.org/bugtraq/2020/Feb/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Feb/36
14
reference_url https://security.netapp.com/advisory/ntap-20191004-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0003/
15
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0003/
16
reference_url https://www.debian.org/security/2020/dsa-4633
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4633
17
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
18
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
19
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1749652
reference_id 1749652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1749652
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010
reference_id 940010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010
22
reference_url https://security.archlinux.org/AVG-1982
reference_id AVG-1982
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1982
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5482
reference_id CVE-2019-5482
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-5482
53
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
54
reference_url https://access.redhat.com/errata/RHSA-2020:0250
reference_id RHSA-2020:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0250
55
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
56
reference_url https://access.redhat.com/errata/RHSA-2020:3916
reference_id RHSA-2020:3916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3916
57
reference_url https://access.redhat.com/errata/RHSA-2021:0759
reference_id RHSA-2021:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0759
58
reference_url https://access.redhat.com/errata/RHSA-2021:0877
reference_id RHSA-2021:0877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0877
59
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
60
reference_url https://access.redhat.com/errata/RHSA-2021:1027
reference_id RHSA-2021:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1027
61
reference_url https://usn.ubuntu.com/4129-1/
reference_id USN-4129-1
reference_type
scores
url https://usn.ubuntu.com/4129-1/
62
reference_url https://usn.ubuntu.com/4129-2/
reference_id USN-4129-2
reference_type
scores
url https://usn.ubuntu.com/4129-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.66.0
purl pkg:generic/curl.se/curl@7.66.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-cp4n-p2z3-43b4
16
vulnerability VCID-d3s1-3qs7-2uhw
17
vulnerability VCID-dc3c-3wab-57gh
18
vulnerability VCID-ddgz-rczw-jqfw
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-frgg-29yv-dyf7
21
vulnerability VCID-ggt7-eejg-xfb6
22
vulnerability VCID-gnx2-djyk-uyaf
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-j5s3-rr74-nqb8
26
vulnerability VCID-ju6h-a1sz-f7e5
27
vulnerability VCID-mkyr-w79c-qqfz
28
vulnerability VCID-ms2r-94ph-yyh3
29
vulnerability VCID-n51k-39uk-auca
30
vulnerability VCID-n57n-cymy-z7dr
31
vulnerability VCID-nvzd-v3bs-6qek
32
vulnerability VCID-ph5u-5j8n-4qah
33
vulnerability VCID-q229-ag6u-u3hv
34
vulnerability VCID-qbpd-star-6fgn
35
vulnerability VCID-qdcn-2u3v-b3cv
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-rmez-cwu2-2ya7
38
vulnerability VCID-s73y-y7v7-43cm
39
vulnerability VCID-sh5a-fmna-wffr
40
vulnerability VCID-syz5-5y6f-s7er
41
vulnerability VCID-t4gn-9fw8-gkc3
42
vulnerability VCID-t8t6-9wa3-aub7
43
vulnerability VCID-u4bx-xqb3-vuef
44
vulnerability VCID-vbbv-k1r7-kkas
45
vulnerability VCID-x57x-w8g8-7ybz
46
vulnerability VCID-xzay-sjpy-3yce
47
vulnerability VCID-y32p-52ps-4ug4
48
vulnerability VCID-y4x5-n5m2-x7bq
49
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.66.0
aliases CVE-2019-5482
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwam-tcmv-kqhc
52
url VCID-x57x-w8g8-7ybz
vulnerability_id VCID-x57x-w8g8-7ybz
summary When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14524
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07212
published_at 2026-04-13T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07128
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07222
published_at 2026-04-12T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-11T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07206
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07151
published_at 2026-04-07T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07177
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14524
2
reference_url https://curl.se/docs/CVE-2025-14524.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://curl.se/docs/CVE-2025-14524.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3459417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://hackerone.com/reports/3459417
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426407
reference_id 2426407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426407
7
reference_url https://curl.se/docs/CVE-2025-14524.json
reference_id CVE-2025-14524.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://curl.se/docs/CVE-2025-14524.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:generic/curl.se/curl@8.18.0
purl pkg:generic/curl.se/curl@8.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-8zks-th64-33b8
2
vulnerability VCID-amgy-dw6h-6ydf
3
vulnerability VCID-etzn-uhck-h7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.18.0
aliases CVE-2025-14524
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz
53
url VCID-xzay-sjpy-3yce
vulnerability_id VCID-xzay-sjpy-3yce
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32206
reference_id
reference_type
scores
0
value 0.04546
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-13T12:55:00Z
1
value 0.04546
scoring_system epss
scoring_elements 0.89143
published_at 2026-04-02T12:55:00Z
2
value 0.04546
scoring_system epss
scoring_elements 0.89158
published_at 2026-04-04T12:55:00Z
3
value 0.04546
scoring_system epss
scoring_elements 0.89161
published_at 2026-04-07T12:55:00Z
4
value 0.04546
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-08T12:55:00Z
5
value 0.04546
scoring_system epss
scoring_elements 0.89183
published_at 2026-04-09T12:55:00Z
6
value 0.04546
scoring_system epss
scoring_elements 0.89193
published_at 2026-04-11T12:55:00Z
7
value 0.04546
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32206
2
reference_url https://curl.se/docs/CVE-2022-32206.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32206.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1570651
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://hackerone.com/reports/1570651
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099300
reference_id 2099300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099300
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://www.openwall.com/lists/oss-security/2023/02/15/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://www.openwall.com/lists/oss-security/2023/02/15/3
23
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
24
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
26
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://www.debian.org/security/2022/dsa-5197
27
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://security.gentoo.org/glsa/202212-01
28
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://support.apple.com/kb/HT213488
29
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
30
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
31
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
32
reference_url https://access.redhat.com/errata/RHSA-2022:6159
reference_id RHSA-2022:6159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6159
33
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
34
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
35
reference_url https://access.redhat.com/errata/RHSA-2023:3460
reference_id RHSA-2023:3460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3460
36
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.84.0
purl pkg:generic/curl.se/curl@7.84.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-4seq-hvbx-7fg8
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bz4u-6rft-s3a8
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-ddgz-rczw-jqfw
16
vulnerability VCID-ej47-4dcu-5fhy
17
vulnerability VCID-etzn-uhck-h7b2
18
vulnerability VCID-gnx2-djyk-uyaf
19
vulnerability VCID-hrsy-694u-2fec
20
vulnerability VCID-m15r-v9sr-2bbn
21
vulnerability VCID-mkyr-w79c-qqfz
22
vulnerability VCID-ms2r-94ph-yyh3
23
vulnerability VCID-n57n-cymy-z7dr
24
vulnerability VCID-nvzd-v3bs-6qek
25
vulnerability VCID-pwn6-j8vf-rufk
26
vulnerability VCID-qdcn-2u3v-b3cv
27
vulnerability VCID-qpux-jh6k-8qhx
28
vulnerability VCID-rg54-svzj-x7f9
29
vulnerability VCID-s73y-y7v7-43cm
30
vulnerability VCID-syz5-5y6f-s7er
31
vulnerability VCID-t9p4-2x7v-yfaq
32
vulnerability VCID-tcqe-7skm-b3fz
33
vulnerability VCID-u4bx-xqb3-vuef
34
vulnerability VCID-vbbv-k1r7-kkas
35
vulnerability VCID-wgma-bycg-1qb1
36
vulnerability VCID-x57x-w8g8-7ybz
37
vulnerability VCID-xpss-yndr-mycj
38
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.84.0
aliases CVE-2022-32206
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce
54
url VCID-y32p-52ps-4ug4
vulnerability_id VCID-y32p-52ps-4ug4
summary
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73042
published_at 2026-04-04T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-02T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-13T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.7307
published_at 2026-04-12T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.73091
published_at 2026-04-11T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73066
published_at 2026-04-09T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-08T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
2
reference_url https://curl.se/docs/CVE-2021-22924.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22924.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1223565
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://hackerone.com/reports/1223565
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
reference_id 1981460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
reference_id 991492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
22
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
23
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
24
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
25
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
26
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
27
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
28
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
29
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
30
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
31
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
32
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
33
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
reference_id CVE-2021-22924
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
35
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://www.debian.org/security/2022/dsa-5197
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
37
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
38
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
39
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
40
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
44
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
45
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
46
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
47
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
reference_id ssa-732250.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
48
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.78.0
purl pkg:generic/curl.se/curl@7.78.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-4e1k-7bj9-hfch
6
vulnerability VCID-4gze-cwtp-2bgr
7
vulnerability VCID-6we4-n888-6qhe
8
vulnerability VCID-75nw-4e2d-zqgg
9
vulnerability VCID-7srk-hshe-h3f4
10
vulnerability VCID-8zks-th64-33b8
11
vulnerability VCID-9ggp-5wfj-ufcq
12
vulnerability VCID-9nak-pscy-e7gs
13
vulnerability VCID-arjz-67yz-wkg9
14
vulnerability VCID-bb2f-7qrm-1kca
15
vulnerability VCID-bdy2-8gub-tfe6
16
vulnerability VCID-cbah-e86c-w3fj
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-ej47-4dcu-5fhy
19
vulnerability VCID-etzn-uhck-h7b2
20
vulnerability VCID-gnx2-djyk-uyaf
21
vulnerability VCID-gv7x-j8bz-wycc
22
vulnerability VCID-hrsy-694u-2fec
23
vulnerability VCID-mkyr-w79c-qqfz
24
vulnerability VCID-ms2r-94ph-yyh3
25
vulnerability VCID-n57n-cymy-z7dr
26
vulnerability VCID-nvzd-v3bs-6qek
27
vulnerability VCID-pwn6-j8vf-rufk
28
vulnerability VCID-q229-ag6u-u3hv
29
vulnerability VCID-qdcn-2u3v-b3cv
30
vulnerability VCID-qpux-jh6k-8qhx
31
vulnerability VCID-r7bh-7wur-xffs
32
vulnerability VCID-s73y-y7v7-43cm
33
vulnerability VCID-sh5a-fmna-wffr
34
vulnerability VCID-syz5-5y6f-s7er
35
vulnerability VCID-t1fk-cbsx-j3gh
36
vulnerability VCID-t4gn-9fw8-gkc3
37
vulnerability VCID-t8t6-9wa3-aub7
38
vulnerability VCID-t9p4-2x7v-yfaq
39
vulnerability VCID-tcqe-7skm-b3fz
40
vulnerability VCID-u4bx-xqb3-vuef
41
vulnerability VCID-vbbv-k1r7-kkas
42
vulnerability VCID-wgma-bycg-1qb1
43
vulnerability VCID-x57x-w8g8-7ybz
44
vulnerability VCID-xpss-yndr-mycj
45
vulnerability VCID-xzay-sjpy-3yce
46
vulnerability VCID-y4x5-n5m2-x7bq
47
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0
aliases CVE-2021-22924
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4
55
url VCID-y4x5-n5m2-x7bq
vulnerability_id VCID-y4x5-n5m2-x7bq
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-13T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37819
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.3787
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37883
published_at 2026-04-09T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37862
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
2
reference_url https://curl.se/docs/CVE-2022-32208.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32208.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1590071
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://hackerone.com/reports/1590071
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
reference_id 2099306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
23
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://support.apple.com/kb/HT213488
28
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
29
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
30
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
31
reference_url https://access.redhat.com/errata/RHSA-2022:6159
reference_id RHSA-2022:6159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6159
32
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
33
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
34
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
35
reference_url https://usn.ubuntu.com/5499-1/
reference_id USN-5499-1
reference_type
scores
url https://usn.ubuntu.com/5499-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.84.0
purl pkg:generic/curl.se/curl@7.84.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2xmp-jc8v-bucb
2
vulnerability VCID-47qb-2qkw-1qej
3
vulnerability VCID-4e1k-7bj9-hfch
4
vulnerability VCID-4gze-cwtp-2bgr
5
vulnerability VCID-4seq-hvbx-7fg8
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bz4u-6rft-s3a8
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-ddgz-rczw-jqfw
16
vulnerability VCID-ej47-4dcu-5fhy
17
vulnerability VCID-etzn-uhck-h7b2
18
vulnerability VCID-gnx2-djyk-uyaf
19
vulnerability VCID-hrsy-694u-2fec
20
vulnerability VCID-m15r-v9sr-2bbn
21
vulnerability VCID-mkyr-w79c-qqfz
22
vulnerability VCID-ms2r-94ph-yyh3
23
vulnerability VCID-n57n-cymy-z7dr
24
vulnerability VCID-nvzd-v3bs-6qek
25
vulnerability VCID-pwn6-j8vf-rufk
26
vulnerability VCID-qdcn-2u3v-b3cv
27
vulnerability VCID-qpux-jh6k-8qhx
28
vulnerability VCID-rg54-svzj-x7f9
29
vulnerability VCID-s73y-y7v7-43cm
30
vulnerability VCID-syz5-5y6f-s7er
31
vulnerability VCID-t9p4-2x7v-yfaq
32
vulnerability VCID-tcqe-7skm-b3fz
33
vulnerability VCID-u4bx-xqb3-vuef
34
vulnerability VCID-vbbv-k1r7-kkas
35
vulnerability VCID-wgma-bycg-1qb1
36
vulnerability VCID-x57x-w8g8-7ybz
37
vulnerability VCID-xpss-yndr-mycj
38
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.84.0
aliases CVE-2022-32208
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq
56
url VCID-yvdd-ataf-ckf1
vulnerability_id VCID-yvdd-ataf-ckf1
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8231
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36798
published_at 2026-04-13T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36823
published_at 2026-04-12T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44761
published_at 2026-04-01T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-02T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44863
published_at 2026-04-04T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44803
published_at 2026-04-07T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44855
published_at 2026-04-08T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44858
published_at 2026-04-09T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44875
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8231
2
reference_url https://curl.se/docs/CVE-2020-8231.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8231.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/948876
reference_id
reference_type
scores
url https://hackerone.com/reports/948876
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868032
reference_id 1868032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868032
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831
reference_id 968831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8231
reference_id CVE-2020-8231
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8231
16
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
17
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
18
reference_url https://usn.ubuntu.com/4466-1/
reference_id USN-4466-1
reference_type
scores
url https://usn.ubuntu.com/4466-1/
19
reference_url https://usn.ubuntu.com/4466-2/
reference_id USN-4466-2
reference_type
scores
url https://usn.ubuntu.com/4466-2/
20
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
fixed_packages
0
url pkg:generic/curl.se/curl@7.72.0
purl pkg:generic/curl.se/curl@7.72.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-2cx5-1qnw-uufj
2
vulnerability VCID-2xmp-jc8v-bucb
3
vulnerability VCID-3sy2-4f3g-zkac
4
vulnerability VCID-47qb-2qkw-1qej
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-75nw-4e2d-zqgg
8
vulnerability VCID-7srk-hshe-h3f4
9
vulnerability VCID-8zks-th64-33b8
10
vulnerability VCID-9ggp-5wfj-ufcq
11
vulnerability VCID-9nak-pscy-e7gs
12
vulnerability VCID-arjz-67yz-wkg9
13
vulnerability VCID-bb2f-7qrm-1kca
14
vulnerability VCID-cbah-e86c-w3fj
15
vulnerability VCID-d3s1-3qs7-2uhw
16
vulnerability VCID-dc3c-3wab-57gh
17
vulnerability VCID-ddgz-rczw-jqfw
18
vulnerability VCID-etzn-uhck-h7b2
19
vulnerability VCID-frgg-29yv-dyf7
20
vulnerability VCID-ggt7-eejg-xfb6
21
vulnerability VCID-gnx2-djyk-uyaf
22
vulnerability VCID-gv7x-j8bz-wycc
23
vulnerability VCID-hrsy-694u-2fec
24
vulnerability VCID-hudt-78dw-tkf2
25
vulnerability VCID-ju6h-a1sz-f7e5
26
vulnerability VCID-mkyr-w79c-qqfz
27
vulnerability VCID-ms2r-94ph-yyh3
28
vulnerability VCID-n51k-39uk-auca
29
vulnerability VCID-n57n-cymy-z7dr
30
vulnerability VCID-nvzd-v3bs-6qek
31
vulnerability VCID-ph5u-5j8n-4qah
32
vulnerability VCID-q229-ag6u-u3hv
33
vulnerability VCID-qbpd-star-6fgn
34
vulnerability VCID-qdcn-2u3v-b3cv
35
vulnerability VCID-qpux-jh6k-8qhx
36
vulnerability VCID-r7bh-7wur-xffs
37
vulnerability VCID-rmez-cwu2-2ya7
38
vulnerability VCID-s73y-y7v7-43cm
39
vulnerability VCID-sh5a-fmna-wffr
40
vulnerability VCID-syz5-5y6f-s7er
41
vulnerability VCID-t1fk-cbsx-j3gh
42
vulnerability VCID-t4gn-9fw8-gkc3
43
vulnerability VCID-t8t6-9wa3-aub7
44
vulnerability VCID-tcqe-7skm-b3fz
45
vulnerability VCID-u4bx-xqb3-vuef
46
vulnerability VCID-vbbv-k1r7-kkas
47
vulnerability VCID-x57x-w8g8-7ybz
48
vulnerability VCID-xzay-sjpy-3yce
49
vulnerability VCID-y32p-52ps-4ug4
50
vulnerability VCID-y4x5-n5m2-x7bq
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.72.0
aliases CVE-2020-8231
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvdd-ataf-ckf1
Fixing_vulnerabilities
0
url VCID-tz47-j4ey-t7g6
vulnerability_id VCID-tz47-j4ey-t7g6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65698
published_at 2026-04-13T12:55:00Z
1
value 0.006
scoring_system epss
scoring_elements 0.69387
published_at 2026-04-01T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-11T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69466
published_at 2026-04-12T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-02T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-04T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-07T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.69444
published_at 2026-04-08T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.6946
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
2
reference_url https://curl.se/docs/CVE-2018-14618.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-14618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
reference_id 1622707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
reference_id 908327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
7
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
8
reference_url https://access.redhat.com/errata/RHSA-2019:1880
reference_id RHSA-2019:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1880
9
reference_url https://usn.ubuntu.com/3765-1/
reference_id USN-3765-1
reference_type
scores
url https://usn.ubuntu.com/3765-1/
10
reference_url https://usn.ubuntu.com/3765-2/
reference_id USN-3765-2
reference_type
scores
url https://usn.ubuntu.com/3765-2/
fixed_packages
0
url pkg:generic/curl.se/curl@7.61.1
purl pkg:generic/curl.se/curl@7.61.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k8f-qgcv-xkhb
1
vulnerability VCID-29n1-4u2b-tkgj
2
vulnerability VCID-2b39-ubrt-hkc6
3
vulnerability VCID-2cx5-1qnw-uufj
4
vulnerability VCID-2xmp-jc8v-bucb
5
vulnerability VCID-3sy2-4f3g-zkac
6
vulnerability VCID-47qb-2qkw-1qej
7
vulnerability VCID-56wg-yafz-gkgx
8
vulnerability VCID-5n7a-9j23-e7dj
9
vulnerability VCID-6we4-n888-6qhe
10
vulnerability VCID-75nw-4e2d-zqgg
11
vulnerability VCID-79sv-kzb5-hbc4
12
vulnerability VCID-7srk-hshe-h3f4
13
vulnerability VCID-8zks-th64-33b8
14
vulnerability VCID-9cbd-x468-rkaw
15
vulnerability VCID-9ggp-5wfj-ufcq
16
vulnerability VCID-9nak-pscy-e7gs
17
vulnerability VCID-arjz-67yz-wkg9
18
vulnerability VCID-bb2f-7qrm-1kca
19
vulnerability VCID-cbah-e86c-w3fj
20
vulnerability VCID-cp4n-p2z3-43b4
21
vulnerability VCID-d3s1-3qs7-2uhw
22
vulnerability VCID-dc3c-3wab-57gh
23
vulnerability VCID-ddgz-rczw-jqfw
24
vulnerability VCID-dhrf-2sz5-3bhf
25
vulnerability VCID-etzn-uhck-h7b2
26
vulnerability VCID-ggt7-eejg-xfb6
27
vulnerability VCID-gnx2-djyk-uyaf
28
vulnerability VCID-hrsy-694u-2fec
29
vulnerability VCID-hudt-78dw-tkf2
30
vulnerability VCID-ju6h-a1sz-f7e5
31
vulnerability VCID-mkyr-w79c-qqfz
32
vulnerability VCID-ms2r-94ph-yyh3
33
vulnerability VCID-n51k-39uk-auca
34
vulnerability VCID-n57n-cymy-z7dr
35
vulnerability VCID-nvzd-v3bs-6qek
36
vulnerability VCID-ph5u-5j8n-4qah
37
vulnerability VCID-q229-ag6u-u3hv
38
vulnerability VCID-qbpd-star-6fgn
39
vulnerability VCID-qdcn-2u3v-b3cv
40
vulnerability VCID-qpfa-s6sd-8yct
41
vulnerability VCID-r7bh-7wur-xffs
42
vulnerability VCID-rmez-cwu2-2ya7
43
vulnerability VCID-s73y-y7v7-43cm
44
vulnerability VCID-sh5a-fmna-wffr
45
vulnerability VCID-syz5-5y6f-s7er
46
vulnerability VCID-t4gn-9fw8-gkc3
47
vulnerability VCID-u4bx-xqb3-vuef
48
vulnerability VCID-v3qf-6wju-1bg8
49
vulnerability VCID-vbbv-k1r7-kkas
50
vulnerability VCID-w8ks-xk66-r3fm
51
vulnerability VCID-wwam-tcmv-kqhc
52
vulnerability VCID-x57x-w8g8-7ybz
53
vulnerability VCID-xzay-sjpy-3yce
54
vulnerability VCID-y32p-52ps-4ug4
55
vulnerability VCID-y4x5-n5m2-x7bq
56
vulnerability VCID-yvdd-ataf-ckf1
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.61.1
aliases CVE-2018-14618
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.61.1