| 0 |
| url |
VCID-4ayz-e7qd-q3hv |
| vulnerability_id |
VCID-4ayz-e7qd-q3hv |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52171 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52254 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52289 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52316 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45085 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45085
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ayz-e7qd-q3hv |
|
| 1 |
| url |
VCID-bpgn-654d-5kh6 |
| vulnerability_id |
VCID-bpgn-654d-5kh6 |
| summary |
In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26081 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39044 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39099 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39116 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39128 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.3909 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.3907 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39126 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39096 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26081 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-26081
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bpgn-654d-5kh6 |
|
| 2 |
| url |
VCID-cdnq-ar2x-rfc4 |
| vulnerability_id |
VCID-cdnq-ar2x-rfc4 |
| summary |
The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73149 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73045 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73054 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73049 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73086 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73123 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73103 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73097 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.7314 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0238 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0238
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdnq-ar2x-rfc4 |
|
| 3 |
| url |
VCID-drpr-qvbq-c7ep |
| vulnerability_id |
VCID-drpr-qvbq-c7ep |
| summary |
A vulnerability has been discovered in Epiphany, which can lead to a buffer overflow. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35761 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3589 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3572 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35789 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35798 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35754 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35731 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35772 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29536 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29536
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drpr-qvbq-c7ep |
|
| 4 |
| url |
VCID-dy4t-8mzp-k3h9 |
| vulnerability_id |
VCID-dy4t-8mzp-k3h9 |
| summary |
An untrusted search path vulnerability in Epiphany might result in the
execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5985 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20802 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20837 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20987 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21045 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20838 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20819 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2081 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5985 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5985
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dy4t-8mzp-k3h9 |
|
| 5 |
| url |
VCID-fw5u-mcy4-1uaz |
| vulnerability_id |
VCID-fw5u-mcy4-1uaz |
| summary |
ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71714 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71627 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71634 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71665 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71675 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71699 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71683 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71664 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11396 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11396
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fw5u-mcy4-1uaz |
|
| 6 |
| url |
VCID-h8vr-29am-jueb |
| vulnerability_id |
VCID-h8vr-29am-jueb |
| summary |
Epiphany 2.28 and 2.29, when WebKit and LibSoup are used, unconditionally displays a closed-lock icon for any URL beginning with the https: substring, without any warning to the user, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted X.509 server certificate. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3312 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67354 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67245 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67281 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67304 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67355 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67319 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3312 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-3312
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h8vr-29am-jueb |
|
| 7 |
| url |
VCID-hk4w-wqwm-b7dx |
| vulnerability_id |
VCID-hk4w-wqwm-b7dx |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43693 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43749 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43773 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4378 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43748 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43793 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43784 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45086 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45086
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hk4w-wqwm-b7dx |
|
| 8 |
| url |
VCID-kr9h-du4n-zbck |
| vulnerability_id |
VCID-kr9h-du4n-zbck |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45087 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52171 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52254 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52289 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52316 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45087 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45087
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kr9h-du4n-zbck |
|
| 9 |
| url |
VCID-qu2d-vqp3-w3e3 |
| vulnerability_id |
VCID-qu2d-vqp3-w3e3 |
| summary |
A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0444 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04423 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04391 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04445 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04455 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-3839
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qu2d-vqp3-w3e3 |
|
| 10 |
| url |
VCID-t8h7-hah9-bkaw |
| vulnerability_id |
VCID-t8h7-hah9-bkaw |
| summary |
gvdb: use after free issue was fixed in gvdb_table_write_contents_async() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-25085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67476 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67512 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67511 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67577 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67599 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67588 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.676 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-25085 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-25085
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t8h7-hah9-bkaw |
|
| 11 |
| url |
VCID-u2z3-9rm9-suda |
| vulnerability_id |
VCID-u2z3-9rm9-suda |
| summary |
GNOME Web (Epiphany) 3.23 before 3.23.5, 3.22 before 3.22.6, 3.20 before 3.20.7, 3.18 before 3.18.11, and prior versions, is vulnerable to a password manager sweep attack resulting in the remote exfiltration of stored passwords for a selected set of websites. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65798 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65847 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65924 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65932 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000025 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000025
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u2z3-9rm9-suda |
|
| 12 |
| url |
VCID-v1k1-swqj-akcj |
| vulnerability_id |
VCID-v1k1-swqj-akcj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45088 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52171 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52254 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52289 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52316 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45088 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45088
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v1k1-swqj-akcj |
|
| 13 |
| url |
VCID-wruk-nknh-2fh4 |
| vulnerability_id |
VCID-wruk-nknh-2fh4 |
| summary |
libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via certain window.open and document.write calls. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75627 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75623 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75524 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75554 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75534 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75576 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75587 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75612 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75593 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00894 |
| scoring_system |
epss |
| scoring_elements |
0.75586 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12016 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12016
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wruk-nknh-2fh4 |
|