cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-9586,https://securityvulnerability.io/vulnerability/CVE-2016-9586,Buffer Overflow Vulnerability in Curl Affecting Prior Versions,"An issue exists in versions of curl prior to 7.52.0 where a buffer overflow may occur during large floating point outputs in libcurl's printf() implementation. This vulnerability can be exploited in situations where an application accepts format strings from untrusted sources without adequate input validation, potentially allowing attackers to execute remote commands and compromise system integrity.",Red Hat,Curl,5.9,MEDIUM,0.01534000039100647,false,,false,false,false,,,false,false,,2018-04-23T18:00:00.000Z,0 CVE-2017-2628,https://securityvulnerability.io/vulnerability/CVE-2017-2628,CURL Vulnerability in Red Hat Enterprise Linux 6,"The vulnerability in curl, included in Red Hat Enterprise Linux 6 versions prior to 7.19.7-53, arises from an improper backport of a security fix. Originally intended to address a previous vulnerability (CVE-2015-3148), the fix failed to consider key changes in the configuration definitions, specifically the transition from HAVE_GSSAPI to USE_HTTP_NEGOTIATE. This flaw was introduced in RHEL 6.7 and compromises the security integrity of curl within the affected operating system.",Red Hat,Curl,9.8,CRITICAL,0.004430000204592943,false,,false,false,false,,,false,false,,2018-03-12T15:00:00.000Z,0