| 0 |
| url |
VCID-6w3g-x86a-sfbj |
| vulnerability_id |
VCID-6w3g-x86a-sfbj |
| summary |
libvncserver: libvncserver/corre.c allows out-of-bounds access via encodings |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14402 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.8441 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84425 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84444 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84468 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84486 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84481 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84503 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84504 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02216 |
| scoring_system |
epss |
| scoring_elements |
0.84506 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14402 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14402
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6w3g-x86a-sfbj |
|
| 1 |
| url |
VCID-7taj-t1kg-h3a9 |
| vulnerability_id |
VCID-7taj-t1kg-h3a9 |
| summary |
libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72252 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72255 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72265 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73743 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73778 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.7376 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73703 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73713 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00784 |
| scoring_system |
epss |
| scoring_elements |
0.73736 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25708 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-25708
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7taj-t1kg-h3a9 |
|
| 2 |
| url |
VCID-9eyh-gzse-8qdk |
| vulnerability_id |
VCID-9eyh-gzse-8qdk |
| summary |
libvncserver: libvncserver/scale.c has a pixel_value integer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14401 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81711 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81721 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81741 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81768 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81792 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.8178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81776 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81813 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01613 |
| scoring_system |
epss |
| scoring_elements |
0.81816 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14401 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14401
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9eyh-gzse-8qdk |
|
| 3 |
| url |
VCID-d3c1-uv78-a7cj |
| vulnerability_id |
VCID-d3c1-uv78-a7cj |
| summary |
libvncserver: libvncserver/rre.c allows out-of-bounds access via encodings |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14404 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79907 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79914 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79923 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79952 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79961 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79981 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79964 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79956 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79987 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14404 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14404
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c1-uv78-a7cj |
|
| 4 |
| url |
VCID-dmax-ew5t-4fg4 |
| vulnerability_id |
VCID-dmax-ew5t-4fg4 |
| summary |
libvncserver: libvncclient/tls_openssl.c has a NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81513 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81525 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81572 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81578 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81598 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81616 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81617 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81621 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14396 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14396
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dmax-ew5t-4fg4 |
|
| 5 |
| url |
VCID-dzex-yhec-uydq |
| vulnerability_id |
VCID-dzex-yhec-uydq |
| summary |
libvncserver: websocket decoding buffer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18922 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89423 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89441 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89469 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89477 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89478 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.04777 |
| scoring_system |
epss |
| scoring_elements |
0.89475 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18922 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-18922
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzex-yhec-uydq |
|
| 6 |
| url |
VCID-j4kf-j3t8-fbfb |
| vulnerability_id |
VCID-j4kf-j3t8-fbfb |
| summary |
libvncserver: an improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84576 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.8459 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84611 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84613 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84634 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84641 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84659 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84654 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84649 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.8467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02271 |
| scoring_system |
epss |
| scoring_elements |
0.84672 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14398 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14398
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j4kf-j3t8-fbfb |
|
| 7 |
| url |
VCID-kzk2-vaa2-6bfa |
| vulnerability_id |
VCID-kzk2-vaa2-6bfa |
| summary |
libvncserver: byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14399 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85266 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85176 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85228 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85236 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85251 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85249 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85265 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02462 |
| scoring_system |
epss |
| scoring_elements |
0.85267 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14399 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14399
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzk2-vaa2-6bfa |
|
| 8 |
| url |
VCID-nxh7-7s8e-g3ec |
| vulnerability_id |
VCID-nxh7-7s8e-g3ec |
| summary |
libvncserver: libvncserver/hextile.c allows out-of-bounds access via encodings |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14403 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78107 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78145 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78128 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78161 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78165 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78198 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01113 |
| scoring_system |
epss |
| scoring_elements |
0.78192 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14403 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14403
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nxh7-7s8e-g3ec |
|
| 9 |
| url |
VCID-q3t7-3yq6-gkan |
| vulnerability_id |
VCID-q3t7-3yq6-gkan |
| summary |
libvncserver: unaligned accesses in hybiReadAndDecode can lead to a crash |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20840 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83715 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83742 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83785 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83781 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83815 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02026 |
| scoring_system |
epss |
| scoring_elements |
0.83816 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20840 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20840
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q3t7-3yq6-gkan |
|
| 10 |
| url |
VCID-q4eg-8ph7-nfer |
| vulnerability_id |
VCID-q4eg-8ph7-nfer |
| summary |
libvncserver: information disclosure and ASLR bypass |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90805 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90811 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90823 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90833 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90845 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90851 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.9086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90857 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90882 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.06191 |
| scoring_system |
epss |
| scoring_elements |
0.90878 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-15681
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q4eg-8ph7-nfer |
|
| 11 |
| url |
VCID-qde7-y8q2-2bgq |
| vulnerability_id |
VCID-qde7-y8q2-2bgq |
| summary |
libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88864 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88872 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88928 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.8892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88934 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88932 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88888 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.8889 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88909 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.04329 |
| scoring_system |
epss |
| scoring_elements |
0.88925 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15690 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-15690
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qde7-y8q2-2bgq |
|
| 12 |
| url |
VCID-qfyp-1xhm-13au |
| vulnerability_id |
VCID-qfyp-1xhm-13au |
| summary |
libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14397 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.88996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89004 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.8902 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89022 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89039 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89045 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89057 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89052 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.8905 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89064 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89063 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.04438 |
| scoring_system |
epss |
| scoring_elements |
0.89059 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14397 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14397
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qfyp-1xhm-13au |
|
| 13 |
| url |
VCID-sgkq-a36z-gyfp |
| vulnerability_id |
VCID-sgkq-a36z-gyfp |
| summary |
libvncserver: buffer overflow in ConnectClientToUnixSock() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20839 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88505 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88513 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.8853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88534 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88553 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88561 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88575 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.04081 |
| scoring_system |
epss |
| scoring_elements |
0.88571 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20839 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20839
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sgkq-a36z-gyfp |
|
| 14 |
| url |
VCID-tj14-ykx8-qqgn |
| vulnerability_id |
VCID-tj14-ykx8-qqgn |
| summary |
libvncserver: integer overflow and heap-based buffer overflow in libvncclient/cursor.c in HandleCursorShape function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20788 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.7402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73929 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73938 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73935 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73969 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.74006 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73988 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.74019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.74028 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20788 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20788
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tj14-ykx8-qqgn |
|
| 15 |
| url |
VCID-tnzy-mktx-e7fm |
| vulnerability_id |
VCID-tnzy-mktx-e7fm |
| summary |
libvncserver: a memory leak via the function rfbClientCleanup() may lead to a DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46493 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46551 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46578 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4655 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46559 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46615 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46613 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29260 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-29260
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tnzy-mktx-e7fm |
|
| 16 |
| url |
VCID-wzpf-4nu7-xyc6 |
| vulnerability_id |
VCID-wzpf-4nu7-xyc6 |
| summary |
libvncserver: libvncclient/rfbproto.c does not limit TextChat size |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14405 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80698 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80729 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80725 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80753 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80761 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80778 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80762 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80754 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80791 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80792 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01448 |
| scoring_system |
epss |
| scoring_elements |
0.80793 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14405 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14405
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wzpf-4nu7-xyc6 |
|
| 17 |
| url |
VCID-x78k-5wm4-kkaj |
| vulnerability_id |
VCID-x78k-5wm4-kkaj |
| summary |
libvncserver: byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14400 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85211 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85223 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85266 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85274 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85288 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85286 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85283 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85304 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02477 |
| scoring_system |
epss |
| scoring_elements |
0.85305 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14400 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14400
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x78k-5wm4-kkaj |
|