{"url":"http://public2.vulnerablecode.io/api/packages/83243?format=json","purl":"pkg:ebuild/net-misc/curl@7.15.0","type":"ebuild","namespace":"net-misc","name":"curl","version":"7.15.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7.15.1","latest_non_vulnerable_version":"8.7.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56919?format=json","vulnerability_id":"VCID-4drq-2td7-akbk","summary":"cURL is vulnerable to a buffer overflow which could lead to the execution\n    of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=302847","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"reference_url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185","reference_id":"","reference_type":"","scores":[{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89578","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185"},{"reference_url":"https://curl.se/docs/CVE-2005-3185.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-3185.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"},{"reference_url":"http://secunia.com/advisories/17192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17192"},{"reference_url":"http://secunia.com/advisories/17193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17193"},{"reference_url":"http://secunia.com/advisories/17203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17203"},{"reference_url":"http://secunia.com/advisories/17208","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17208"},{"reference_url":"http://secunia.com/advisories/17228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17228"},{"reference_url":"http://secunia.com/advisories/17247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17247"},{"reference_url":"http://secunia.com/advisories/17297","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17297"},{"reference_url":"http://secunia.com/advisories/17320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17320"},{"reference_url":"http://secunia.com/advisories/17400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17400"},{"reference_url":"http://secunia.com/advisories/17403","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17403"},{"reference_url":"http://secunia.com/advisories/17485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17485"},{"reference_url":"http://secunia.com/advisories/17813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17813"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/19193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19193"},{"reference_url":"http://securityreason.com/securityalert/82","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/82"},{"reference_url":"http://securitytracker.com/id?1015056","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015056"},{"reference_url":"http://securitytracker.com/id?1015057","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015057"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"},{"reference_url":"http://www.osvdb.org/20011","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/20011"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-807.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-812.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-812.html"},{"reference_url":"http://www.securityfocus.com/bid/15102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15102"},{"reference_url":"http://www.securityfocus.com/bid/15647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15647"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2088","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2088"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2125","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2125"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794","reference_id":"1617794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734","reference_id":"333734","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185","reference_id":"CVE-2005-3185","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185"},{"reference_url":"https://security.gentoo.org/glsa/200510-19","reference_id":"GLSA-200510-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200510-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:807","reference_id":"RHSA-2005:807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:812","reference_id":"RHSA-2005:812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:812"},{"reference_url":"https://usn.ubuntu.com/205-1/","reference_id":"USN-205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83243?format=json","purl":"pkg:ebuild/net-misc/curl@7.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.15.0"}],"aliases":["CVE-2005-3185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.15.0"}