| 0 |
| url |
VCID-1z9b-trb7-2ubp |
| vulnerability_id |
VCID-1z9b-trb7-2ubp |
| summary |
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
making them vulnerable to the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 2 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92776 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92732 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92739 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92742 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92752 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92762 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.09332 |
| scoring_system |
epss |
| scoring_elements |
0.92772 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3626 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3626
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp |
|
| 1 |
| url |
VCID-2chf-23mc-d3dn |
| vulnerability_id |
VCID-2chf-23mc-d3dn |
| summary |
cups: access to uninitialized buffer in ipp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24831 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24951 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24838 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24767 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24759 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24736 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10001 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10001
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn |
|
| 2 |
| url |
VCID-2weh-q66p-8bdg |
| vulnerability_id |
VCID-2weh-q66p-8bdg |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0302 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.8997 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.89973 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.89985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.8999 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90006 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90012 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.9002 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90018 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90028 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90029 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0529 |
| scoring_system |
epss |
| scoring_elements |
0.90026 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0302 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0302
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2weh-q66p-8bdg |
|
| 3 |
| url |
VCID-35gf-189e-3ud4 |
| vulnerability_id |
VCID-35gf-189e-3ud4 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5029 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15306 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15343 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15412 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15216 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15317 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15277 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15212 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15126 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15133 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5029 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5029
|
| risk_score |
0.7 |
| exploitability |
0.5 |
| weighted_severity |
1.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4 |
|
| 4 |
| url |
VCID-39f1-22a5-c7aw |
| vulnerability_id |
VCID-39f1-22a5-c7aw |
| summary |
Multiple vulnerabilities have been found in cups-filters, the worst
of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3258 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97131 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97145 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97155 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.9716 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97169 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.9717 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.37078 |
| scoring_system |
epss |
| scoring_elements |
0.97174 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3258 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3258
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw |
|
| 5 |
| url |
VCID-3ame-feez-yqhc |
| vulnerability_id |
VCID-3ame-feez-yqhc |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99181 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99185 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99188 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.9919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.81706 |
| scoring_system |
epss |
| scoring_elements |
0.99192 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1158 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1158
|
| risk_score |
1.4 |
| exploitability |
2.0 |
| weighted_severity |
0.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc |
|
| 6 |
| url |
VCID-3cy2-awj3-hqhn |
| vulnerability_id |
VCID-3cy2-awj3-hqhn |
| summary |
cups: memory leak handling IPP browse requests |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0596 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88905 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88913 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.8895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88955 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88967 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88961 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.8896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88972 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04363 |
| scoring_system |
epss |
| scoring_elements |
0.88971 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0596 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0596
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3cy2-awj3-hqhn |
|
| 7 |
| url |
VCID-3etj-2m21-ffa1 |
| vulnerability_id |
VCID-3etj-2m21-ffa1 |
| summary |
cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.2918 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.30003 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31552 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32436 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32429 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32439 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32388 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58364 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58364
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1 |
|
| 8 |
| url |
VCID-43eg-4nf5-dubb |
| vulnerability_id |
VCID-43eg-4nf5-dubb |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35085 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.3521 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35249 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35235 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35314 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35196 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35241 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35266 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35269 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35234 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-4183
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-43eg-4nf5-dubb |
|
| 9 |
| url |
VCID-4464-npdy-z3b7 |
| vulnerability_id |
VCID-4464-npdy-z3b7 |
| summary |
Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9225 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92203 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9221 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92216 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9223 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92239 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9224 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92249 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92248 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5286 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5286
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4464-npdy-z3b7 |
|
| 10 |
| url |
VCID-44ju-8618-vqht |
| vulnerability_id |
VCID-44ju-8618-vqht |
| summary |
A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57528 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57612 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57633 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57609 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57663 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57661 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57641 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57671 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8842 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8842
|
| risk_score |
0.7 |
| exploitability |
0.5 |
| weighted_severity |
1.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht |
|
| 11 |
| url |
VCID-48ht-j7ga-9ugq |
| vulnerability_id |
VCID-48ht-j7ga-9ugq |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92649 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92656 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92677 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92683 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.92696 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.09148 |
| scoring_system |
epss |
| scoring_elements |
0.927 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3170 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3170
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq |
|
| 12 |
| url |
VCID-4bxg-5tnm-y3hw |
| vulnerability_id |
VCID-4bxg-5tnm-y3hw |
| summary |
Multiple vulnerabilities have been found in cups-filters, worst of
which allows remote attackers to execute arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5254 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52585 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52612 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52629 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52674 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52657 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52642 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52671 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6476 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6476
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw |
|
| 13 |
| url |
VCID-4cfw-stbc-h3dx |
| vulnerability_id |
VCID-4cfw-stbc-h3dx |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20805 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.21012 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20728 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20806 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20882 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20839 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20787 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20769 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20755 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6358 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-6358
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4cfw-stbc-h3dx |
|
| 14 |
| url |
VCID-4he8-q3nc-3bf7 |
| vulnerability_id |
VCID-4he8-q3nc-3bf7 |
| summary |
Multiple errors in CUPS might allow for the remote execution of arbitrary
code or DNS rebinding attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0163 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89611 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89614 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89628 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89629 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89645 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89656 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.8965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89665 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.89666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0495 |
| scoring_system |
epss |
| scoring_elements |
0.8966 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0163 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0163
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4he8-q3nc-3bf7 |
|
| 15 |
| url |
VCID-4p26-wkq3-v3b2 |
| vulnerability_id |
VCID-4p26-wkq3-v3b2 |
| summary |
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
making them vulnerable to the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85866 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85777 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85808 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85813 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85857 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.8585 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85873 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3628 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3628
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4p26-wkq3-v3b2 |
|
| 16 |
| url |
VCID-4q3f-hdyp-wue3 |
| vulnerability_id |
VCID-4q3f-hdyp-wue3 |
| summary |
cups: password disclosure via debug log |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1033 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42234 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42309 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42337 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42279 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.4233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42361 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42325 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42296 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42346 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42249 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1033 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1033
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4q3f-hdyp-wue3 |
|
| 17 |
| url |
VCID-5q1h-7uk2-nkhx |
| vulnerability_id |
VCID-5q1h-7uk2-nkhx |
| summary |
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
Poppler potentially resulting in the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
|
| 2 |
| reference_url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 4 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 5 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86675 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86592 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86622 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86664 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86662 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86655 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86668 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3193 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3193
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx |
|
| 18 |
| url |
VCID-63fa-a4pr-wqh3 |
| vulnerability_id |
VCID-63fa-a4pr-wqh3 |
| summary |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34978 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18102 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18317 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18019 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22692 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22765 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2278 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22733 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22838 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22859 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22822 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34978 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34978
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63fa-a4pr-wqh3 |
|
| 19 |
| url |
VCID-6mus-21kz-uuhz |
| vulnerability_id |
VCID-6mus-21kz-uuhz |
| summary |
cups: Session cookie generated by the CUPS web interface is easy to guess |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4300 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5925 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59263 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59268 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65602 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65632 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65649 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65668 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65554 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4300 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-4300
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz |
|
| 20 |
| url |
VCID-7gbc-682w-5fdq |
| vulnerability_id |
VCID-7gbc-682w-5fdq |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0540 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60813 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60643 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60747 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60713 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60761 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60776 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60798 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60784 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60765 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60807 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0540 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0540
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-682w-5fdq |
|
| 21 |
| url |
VCID-7wg4-sc9v-bffk |
| vulnerability_id |
VCID-7wg4-sc9v-bffk |
| summary |
cups: Information leak through Cups-Get-Document operation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20037 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19992 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19934 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19963 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22709 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32360 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32360
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk |
|
| 22 |
| url |
VCID-7x99-rwuc-dyh9 |
| vulnerability_id |
VCID-7x99-rwuc-dyh9 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1384 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21394 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21561 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.2162 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21375 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21513 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21524 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21486 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.2143 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21431 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21398 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1384 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1384
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7x99-rwuc-dyh9 |
|
| 23 |
| url |
VCID-843p-8xve-nfer |
| vulnerability_id |
VCID-843p-8xve-nfer |
| summary |
Multiple vulnerabilities have been found in cups-filters, worst of
which allows remote attackers to execute arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6474 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95567 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95581 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95583 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95589 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95592 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95597 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95598 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.956 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95609 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.20771 |
| scoring_system |
epss |
| scoring_elements |
0.95613 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6474 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6474
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer |
|
| 24 |
| url |
VCID-8ac2-74af-wkbw |
| vulnerability_id |
VCID-8ac2-74af-wkbw |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96395 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96402 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96406 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96419 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96422 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96426 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96429 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96436 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.9644 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.27566 |
| scoring_system |
epss |
| scoring_elements |
0.96442 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0053
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ac2-74af-wkbw |
|
| 25 |
| url |
VCID-8p6s-k3gc-z7fr |
| vulnerability_id |
VCID-8p6s-k3gc-z7fr |
| summary |
cups: 'Listen localhost:631' option not honoured correctly on IPv6-enabled systems when systemd used for CUPS socket activation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71622 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71659 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71669 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71693 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71658 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71702 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71708 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.7169 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6094 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6094
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8p6s-k3gc-z7fr |
|
| 26 |
| url |
VCID-8uds-zs9k-47en |
| vulnerability_id |
VCID-8uds-zs9k-47en |
| summary |
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
Poppler potentially resulting in the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
|
| 2 |
| reference_url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 4 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 5 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3191 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86675 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86592 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86622 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86664 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86662 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86655 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03031 |
| scoring_system |
epss |
| scoring_elements |
0.86668 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3191 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3191
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en |
|
| 27 |
| url |
VCID-8yv6-g189-vugt |
| vulnerability_id |
VCID-8yv6-g189-vugt |
| summary |
cups: DoS (daemon crash) caused by the large number of subscriptions |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89297 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89302 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89242 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89248 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89263 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89265 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89283 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89287 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89293 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.8929 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.04639 |
| scoring_system |
epss |
| scoring_elements |
0.89303 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5183 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5183
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8yv6-g189-vugt |
|
| 28 |
| url |
VCID-993k-m3sq-gufu |
| vulnerability_id |
VCID-993k-m3sq-gufu |
| summary |
cups: Authentication Bypass in CUPS Authorization Handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15401 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16433 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16532 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16494 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16436 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16496 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16551 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58060 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58060
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu |
|
| 29 |
| url |
VCID-9e1p-qt31-xffb |
| vulnerability_id |
VCID-9e1p-qt31-xffb |
| summary |
pstopdf in CUPS 1.3.8 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pstopdf.log temporary file, a different vulnerability than CVE-2001-1333. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5377 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45135 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45051 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45132 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45149 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45171 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45138 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.4514 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.4519 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45184 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5377 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5377
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9e1p-qt31-xffb |
|
| 30 |
| url |
VCID-9m44-agjf-buc1 |
| vulnerability_id |
VCID-9m44-agjf-buc1 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4045 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86364 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86382 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86383 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86402 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86412 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86426 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86419 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86435 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.8644 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02931 |
| scoring_system |
epss |
| scoring_elements |
0.86434 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4045 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4045
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9m44-agjf-buc1 |
|
| 31 |
| url |
VCID-adve-thnd-u3gf |
| vulnerability_id |
VCID-adve-thnd-u3gf |
| summary |
CUPS contains a boundary checking error that might lead to the execution of
arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4351 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95965 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95976 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95985 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95987 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.9599 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.95993 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.96003 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.96008 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.23653 |
| scoring_system |
epss |
| scoring_elements |
0.9601 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4351 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4351
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-adve-thnd-u3gf |
|
| 32 |
| url |
VCID-akuy-agys-pkc1 |
| vulnerability_id |
VCID-akuy-agys-pkc1 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.9248 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92488 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92492 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92503 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92514 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92516 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92525 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.08769 |
| scoring_system |
epss |
| scoring_elements |
0.92528 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0558 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-0558
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-akuy-agys-pkc1 |
|
| 33 |
| url |
VCID-am36-6m5v-fkba |
| vulnerability_id |
VCID-am36-6m5v-fkba |
| summary |
cups: libppd: remote command injection via attacker controlled data in PPD file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47175 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96909 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96898 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96895 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.33659 |
| scoring_system |
epss |
| scoring_elements |
0.96955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.33659 |
| scoring_system |
epss |
| scoring_elements |
0.96918 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47175 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
| reference_url |
https://www.cups.org |
| reference_id |
www.cups.org |
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
|
| 1 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/ |
|
|
| url |
https://www.cups.org |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47175
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba |
|
| 34 |
| url |
VCID-anr5-gc12-e7dr |
| vulnerability_id |
VCID-anr5-gc12-e7dr |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16653 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16637 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16809 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16652 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16737 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16791 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16771 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16727 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.1667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16606 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16614 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3537 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3537
|
| risk_score |
0.6 |
| exploitability |
0.5 |
| weighted_severity |
1.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr |
|
| 35 |
| url |
VCID-apyh-1uza-pffa |
| vulnerability_id |
VCID-apyh-1uza-pffa |
| summary |
In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28106 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28084 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28128 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28134 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28043 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27978 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2228 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-2228
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa |
|
| 36 |
| url |
VCID-azma-9b5q-57b3 |
| vulnerability_id |
VCID-azma-9b5q-57b3 |
| summary |
cups: insecure permissions of /var/log/cups allows for symlink attacks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25317 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27748 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27618 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27727 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27732 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27688 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2764 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27614 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27575 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25317 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25317
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-azma-9b5q-57b3 |
|
| 37 |
| url |
VCID-aznw-8yer-xfhf |
| vulnerability_id |
VCID-aznw-8yer-xfhf |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34241 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09686 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0979 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09768 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09785 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09807 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10737 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11703 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1158 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34241 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34241
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf |
|
| 38 |
| url |
VCID-b1yf-xuc1-ykak |
| vulnerability_id |
VCID-b1yf-xuc1-ykak |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39314 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02171 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02187 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02209 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03682 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03555 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04174 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04205 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39314 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-39314
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b1yf-xuc1-ykak |
|
| 39 |
| url |
VCID-b3we-kawj-dkbh |
| vulnerability_id |
VCID-b3we-kawj-dkbh |
| summary |
cups: DoS (stop, crash) by renewing CUPS browse packets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78727 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78734 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78766 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78748 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78781 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78804 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78787 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78778 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.788 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1196 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1196
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b3we-kawj-dkbh |
|
| 40 |
| url |
VCID-b5ea-pbr6-7uep |
| vulnerability_id |
VCID-b5ea-pbr6-7uep |
| summary |
cups: improper use of the 'guest' username in the web UI, when user not logged on to the server |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51936 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51795 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51835 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.5189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51888 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.5194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51922 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51907 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51949 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51955 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5184 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5184
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ea-pbr6-7uep |
|
| 41 |
| url |
VCID-bj8b-t1mc-zfd3 |
| vulnerability_id |
VCID-bj8b-t1mc-zfd3 |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0542 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89034 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.88967 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.88975 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.88991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.88994 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89012 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89024 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89022 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.04413 |
| scoring_system |
epss |
| scoring_elements |
0.89036 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0542 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0542
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bj8b-t1mc-zfd3 |
|
| 42 |
| url |
VCID-bkr4-sab1-5ka2 |
| vulnerability_id |
VCID-bkr4-sab1-5ka2 |
| summary |
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
making them vulnerable to the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 2 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88925 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88863 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88887 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88888 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88906 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88923 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88918 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88931 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04327 |
| scoring_system |
epss |
| scoring_elements |
0.88929 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3627 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3627
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2 |
|
| 43 |
| url |
VCID-bzht-vhe3-y7bf |
| vulnerability_id |
VCID-bzht-vhe3-y7bf |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30128 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30176 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.3019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30171 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40946 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40975 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.4095 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40864 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-4180
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf |
|
| 44 |
| url |
VCID-cf81-58ju-bqaz |
| vulnerability_id |
VCID-cf81-58ju-bqaz |
| summary |
cups: cross-site scripting flaw fixed in the 1.7.2 release |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2856 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77324 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77331 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.7734 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.7737 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77406 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77385 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77422 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77414 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2856 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2856
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz |
|
| 45 |
| url |
VCID-ctb2-8h4y-vybd |
| vulnerability_id |
VCID-ctb2-8h4y-vybd |
| summary |
Multiple vulnerabilities have been found in Poppler, some of which
may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.8988 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89883 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89895 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.899 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89916 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89922 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.8992 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89934 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89936 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0519 |
| scoring_system |
epss |
| scoring_elements |
0.89931 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0166
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd |
|
| 46 |
| url |
VCID-d6f7-xjfh-5ygd |
| vulnerability_id |
VCID-d6f7-xjfh-5ygd |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1268 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28776 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.2895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.29 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28807 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28916 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28877 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28827 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1268 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1268
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d6f7-xjfh-5ygd |
|
| 47 |
| url |
VCID-dgb8-nes9-8fb7 |
| vulnerability_id |
VCID-dgb8-nes9-8fb7 |
| summary |
Multiple vulnerabilities have been found in Poppler, some of which
may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.84926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.8494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.84959 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.84963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.84986 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.84993 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85008 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85006 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85003 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85024 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02384 |
| scoring_system |
epss |
| scoring_elements |
0.85023 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0147 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0147
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7 |
|
| 48 |
| url |
VCID-dqz1-7j8m-9ueh |
| vulnerability_id |
VCID-dqz1-7j8m-9ueh |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0923 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27544 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27757 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27795 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27586 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27655 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27698 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27608 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27583 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0923 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-0923
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqz1-7j8m-9ueh |
|
| 49 |
| url |
VCID-durs-kj4r-jbf2 |
| vulnerability_id |
VCID-durs-kj4r-jbf2 |
| summary |
security flaw |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2097 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21881 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21883 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22045 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22098 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21956 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22011 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22026 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21985 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21927 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21924 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2097 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2097
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2 |
|
| 50 |
| url |
VCID-dx89-e1nn-w7gz |
| vulnerability_id |
VCID-dx89-e1nn-w7gz |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03043 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03144 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03118 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02925 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05318 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05266 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39316 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-39316
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dx89-e1nn-w7gz |
|
| 51 |
| url |
VCID-ed99-uccv-d7bh |
| vulnerability_id |
VCID-ed99-uccv-d7bh |
| summary |
Multiple vulnerabilities have been found in cups-filters, the worst
of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3279 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96967 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96975 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96979 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96981 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.9699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96993 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96994 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.96995 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.97004 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.97007 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.34505 |
| scoring_system |
epss |
| scoring_elements |
0.9701 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3279 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3279
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh |
|
| 52 |
| url |
VCID-enxz-181c-cfgj |
| vulnerability_id |
VCID-enxz-181c-cfgj |
| summary |
Heap-based buffer overflow in the USB backend in CUPS in Apple Mac OS X 10.5.8 allows local users to gain privileges via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2807 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20201 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2035 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20409 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20135 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20216 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20274 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.203 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20254 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20194 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20191 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2019 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2807 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2807
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-enxz-181c-cfgj |
|
| 53 |
| url |
VCID-ev9c-v5dv-37fb |
| vulnerability_id |
VCID-ev9c-v5dv-37fb |
| summary |
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-3898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37102 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37296 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37125 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.3719 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.3714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37185 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37111 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-3898 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-3898
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb |
|
| 54 |
| url |
VCID-fby6-8f6z-63fw |
| vulnerability_id |
VCID-fby6-8f6z-63fw |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16109 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16354 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16239 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16304 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16286 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16247 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16134 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5030 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5030
|
| risk_score |
0.8 |
| exploitability |
0.5 |
| weighted_severity |
1.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw |
|
| 55 |
| url |
VCID-fct6-695j-t7bs |
| vulnerability_id |
VCID-fct6-695j-t7bs |
| summary |
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
overflow allowing for the user-assisted execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92529 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92534 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92541 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92554 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92559 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92565 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92566 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92577 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.08892 |
| scoring_system |
epss |
| scoring_elements |
0.92579 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3387 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3387
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs |
|
| 56 |
| url |
VCID-fkyp-m1p9-mfhy |
| vulnerability_id |
VCID-fkyp-m1p9-mfhy |
| summary |
cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18248 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76945 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.7698 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76994 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77034 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.7705 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77052 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77044 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18248 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-18248
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy |
|
| 57 |
| url |
VCID-fpbv-zqer-w7c3 |
| vulnerability_id |
VCID-fpbv-zqer-w7c3 |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2431 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08428 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0847 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08443 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08517 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08536 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08531 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18717 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18614 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18626 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2431 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2431
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fpbv-zqer-w7c3 |
|
| 58 |
| url |
VCID-g2x8-pm39-sfer |
| vulnerability_id |
VCID-g2x8-pm39-sfer |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0393 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23904 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23692 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23763 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2381 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2378 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23723 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23722 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23698 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0393 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0393
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-pm39-sfer |
|
| 59 |
| url |
VCID-gje5-c2d5-qbaq |
| vulnerability_id |
VCID-gje5-c2d5-qbaq |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1371 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90528 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90564 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90573 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90567 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05872 |
| scoring_system |
epss |
| scoring_elements |
0.90582 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1371 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1371
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gje5-c2d5-qbaq |
|
| 60 |
| url |
VCID-gk6d-e37p-rqbv |
| vulnerability_id |
VCID-gk6d-e37p-rqbv |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0788 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83314 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83328 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83344 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83343 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83367 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83377 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83392 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83386 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01928 |
| scoring_system |
epss |
| scoring_elements |
0.83419 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0788 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0788
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gk6d-e37p-rqbv |
|
| 61 |
| url |
VCID-gvr9-nyym-67d4 |
| vulnerability_id |
VCID-gvr9-nyym-67d4 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.9177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91776 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91784 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91797 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91804 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91807 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91805 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.07511 |
| scoring_system |
epss |
| scoring_elements |
0.91817 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1373
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gvr9-nyym-67d4 |
|
| 62 |
| url |
VCID-hc4t-becn-rkcc |
| vulnerability_id |
VCID-hc4t-becn-rkcc |
| summary |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34979 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11719 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15919 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15775 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15851 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16232 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16195 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34979 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34979
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hc4t-becn-rkcc |
|
| 63 |
| url |
VCID-hunf-nefn-s7a5 |
| vulnerability_id |
VCID-hunf-nefn-s7a5 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1369 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93012 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.9302 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93024 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93023 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93032 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93036 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93039 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.9304 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.9305 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.93053 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.09969 |
| scoring_system |
epss |
| scoring_elements |
0.9306 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1369 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1369
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hunf-nefn-s7a5 |
|
| 64 |
| url |
VCID-jb2g-gyt5-8kd3 |
| vulnerability_id |
VCID-jb2g-gyt5-8kd3 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0882 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95883 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.959 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95903 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95912 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95915 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95918 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.9592 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95931 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95936 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.23075 |
| scoring_system |
epss |
| scoring_elements |
0.95938 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0882 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0882
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jb2g-gyt5-8kd3 |
|
| 65 |
| url |
VCID-jcsq-esrs-zyes |
| vulnerability_id |
VCID-jcsq-esrs-zyes |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28776 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.2895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.29 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28807 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28916 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28877 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28827 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1270 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1270
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jcsq-esrs-zyes |
|
| 66 |
| url |
VCID-jy1y-e1nk-p3b4 |
| vulnerability_id |
VCID-jy1y-e1nk-p3b4 |
| summary |
CUPS: Local denial-of-service via cupsd.conf update and related issues |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-61915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09848 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09838 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09897 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0986 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09727 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09698 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09766 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-61915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-61915
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jy1y-e1nk-p3b4 |
|
| 67 |
| url |
VCID-jy8g-g6m3-pygt |
| vulnerability_id |
VCID-jy8g-g6m3-pygt |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-2154 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65355 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65403 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.6543 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65393 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65446 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65457 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65435 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65471 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65482 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65467 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-2154 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
http://www.cups.org/str.php?L700 |
| reference_id |
str.php?L700 |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-16T14:59:33Z/ |
|
|
| url |
http://www.cups.org/str.php?L700 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-2154
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jy8g-g6m3-pygt |
|
| 68 |
| url |
VCID-jz8v-ckq8-5ug7 |
| vulnerability_id |
VCID-jz8v-ckq8-5ug7 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5849 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96973 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96981 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96996 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.96999 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.97 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.97001 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.9701 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.97013 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.3458 |
| scoring_system |
epss |
| scoring_elements |
0.97016 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5849 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5849
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8v-ckq8-5ug7 |
|
| 69 |
| url |
VCID-k4yw-jg6v-1bcc |
| vulnerability_id |
VCID-k4yw-jg6v-1bcc |
| summary |
cups: Cupsd Listen arbitrary chmod 0140777 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86825 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86756 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86776 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86807 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86822 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-35235
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc |
|
| 70 |
| url |
VCID-kgk7-hqby-wkez |
| vulnerability_id |
VCID-kgk7-hqby-wkez |
| summary |
Poppler and various KDE components are vulnerable to multiple memory
management issues possibly resulting in the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4352 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.9618 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96209 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96212 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96217 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96216 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96218 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96226 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96231 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.25469 |
| scoring_system |
epss |
| scoring_elements |
0.96232 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4352 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4352
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez |
|
| 71 |
| url |
VCID-m5tc-yrms-zuay |
| vulnerability_id |
VCID-m5tc-yrms-zuay |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91146 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.9107 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91075 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91084 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91106 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91112 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91119 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.9112 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.06529 |
| scoring_system |
epss |
| scoring_elements |
0.91143 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0206 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0206
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5tc-yrms-zuay |
|
| 72 |
| url |
VCID-ma98-ankz-ska4 |
| vulnerability_id |
VCID-ma98-ankz-ska4 |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4182 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35085 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.3521 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35249 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35235 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35314 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35196 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35241 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35266 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35269 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35234 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4182 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-4182
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ma98-ankz-ska4 |
|
| 73 |
| url |
VCID-mcmb-bvw9-dba5 |
| vulnerability_id |
VCID-mcmb-bvw9-dba5 |
| summary |
Multiple vulnerabilities have been found in cups-filters, worst of
which allows remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95557 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95566 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95571 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95573 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.9558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95589 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.9559 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95599 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.20679 |
| scoring_system |
epss |
| scoring_elements |
0.95604 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6475
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5 |
|
| 74 |
| url |
VCID-mg1z-d7y8-dfaj |
| vulnerability_id |
VCID-mg1z-d7y8-dfaj |
| summary |
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
making them vulnerable to the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 2 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3624 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91668 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91676 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91691 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91703 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.9171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91716 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91712 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91732 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.07357 |
| scoring_system |
epss |
| scoring_elements |
0.91725 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3624 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3624
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj |
|
| 75 |
| url |
VCID-mg57-dqwb-vqee |
| vulnerability_id |
VCID-mg57-dqwb-vqee |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1269 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92457 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92403 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92421 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92438 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92444 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92455 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.08636 |
| scoring_system |
epss |
| scoring_elements |
0.92454 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1269 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1269
|
| risk_score |
9.0 |
| exploitability |
2.0 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mg57-dqwb-vqee |
|
| 76 |
| url |
VCID-mp2s-4x2a-h7fq |
| vulnerability_id |
VCID-mp2s-4x2a-h7fq |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92953 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92962 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92966 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92974 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92978 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92983 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92981 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92982 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92992 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.92994 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.09847 |
| scoring_system |
epss |
| scoring_elements |
0.93002 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3553 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3553
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mp2s-4x2a-h7fq |
|
| 77 |
| url |
VCID-mtwe-dgnd-c3fj |
| vulnerability_id |
VCID-mtwe-dgnd-c3fj |
| summary |
cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0949 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.9554 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95549 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95554 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95568 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95573 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95574 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.20572 |
| scoring_system |
epss |
| scoring_elements |
0.95582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.22431 |
| scoring_system |
epss |
| scoring_elements |
0.95846 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.22431 |
| scoring_system |
epss |
| scoring_elements |
0.95849 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0949 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0949
|
| risk_score |
0.4 |
| exploitability |
2.0 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mtwe-dgnd-c3fj |
|
| 78 |
| url |
VCID-mtzd-538p-kbhm |
| vulnerability_id |
VCID-mtzd-538p-kbhm |
| summary |
A vulnerability in CUPS may allow for arbitrary file access. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93171 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93123 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93127 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93126 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93134 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93139 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93144 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93141 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93143 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93159 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.10228 |
| scoring_system |
epss |
| scoring_elements |
0.93164 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5519 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5519
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm |
|
| 79 |
| url |
VCID-mvr1-n5d7-zbat |
| vulnerability_id |
VCID-mvr1-n5d7-zbat |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.9478 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94793 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94803 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94816 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94822 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94826 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.16212 |
| scoring_system |
epss |
| scoring_elements |
0.94828 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1383 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1383
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mvr1-n5d7-zbat |
|
| 80 |
| url |
VCID-mybj-wn6t-aucs |
| vulnerability_id |
VCID-mybj-wn6t-aucs |
| summary |
cups: dereference of free'd memory handling IPP browse requests |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90611 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90615 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90633 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.9065 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90659 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90653 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90672 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.9067 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05967 |
| scoring_system |
epss |
| scoring_elements |
0.90667 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0597 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0597
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mybj-wn6t-aucs |
|
| 81 |
| url |
VCID-myv2-xrn1-nbf6 |
| vulnerability_id |
VCID-myv2-xrn1-nbf6 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2874 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80718 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80623 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80632 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80649 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80676 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80686 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80715 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01434 |
| scoring_system |
epss |
| scoring_elements |
0.80716 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2874 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2874
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-myv2-xrn1-nbf6 |
|
| 82 |
| url |
VCID-n7sa-m9h6-cqbv |
| vulnerability_id |
VCID-n7sa-m9h6-cqbv |
| summary |
security flaw |
| references |
| 0 |
| reference_url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch |
|
| 1 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.917 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91642 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.9165 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91656 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91677 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91686 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91707 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.07314 |
| scoring_system |
epss |
| scoring_elements |
0.91699 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1125 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1125
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n7sa-m9h6-cqbv |
|
| 83 |
| url |
VCID-p3zu-wguk-e3h3 |
| vulnerability_id |
VCID-p3zu-wguk-e3h3 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1367 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88229 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88237 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88252 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88276 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88285 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88299 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88297 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.03903 |
| scoring_system |
epss |
| scoring_elements |
0.88296 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1367 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1367
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p3zu-wguk-e3h3 |
|
| 84 |
| url |
VCID-p8gy-dd3u-uqh4 |
| vulnerability_id |
VCID-p8gy-dd3u-uqh4 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09492 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10974 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10918 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10782 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10796 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10917 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26691, MNDT-2022-0026
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4 |
|
| 85 |
| url |
VCID-psw3-kpv9-nbgp |
| vulnerability_id |
VCID-psw3-kpv9-nbgp |
| summary |
Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92076 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92036 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92042 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92066 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92069 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.07958 |
| scoring_system |
epss |
| scoring_elements |
0.92078 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3639 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3639
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-psw3-kpv9-nbgp |
|
| 86 |
| url |
VCID-pwkd-sgtt-1bef |
| vulnerability_id |
VCID-pwkd-sgtt-1bef |
| summary |
cups: DNS rebinding attacks via incorrect whitelist |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18190 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71939 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71966 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71943 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71981 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71993 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72001 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72026 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72034 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72018 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18190 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-18190
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef |
|
| 87 |
| url |
VCID-q8a8-fd7r-1kg7 |
| vulnerability_id |
VCID-q8a8-fd7r-1kg7 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46866 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.4683 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46885 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.4688 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00259 |
| scoring_system |
epss |
| scoring_elements |
0.49279 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00259 |
| scoring_system |
epss |
| scoring_elements |
0.49246 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00259 |
| scoring_system |
epss |
| scoring_elements |
0.49276 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32324 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32324
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7 |
|
| 88 |
| url |
VCID-qjzr-avt1-fyfd |
| vulnerability_id |
VCID-qjzr-avt1-fyfd |
| summary |
xpdf: multiple integer overflows |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0791 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.8969 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89708 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.8971 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89739 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89749 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05022 |
| scoring_system |
epss |
| scoring_elements |
0.89744 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0791 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0791
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qjzr-avt1-fyfd |
|
| 89 |
| url |
VCID-qway-gm1y-yqcg |
| vulnerability_id |
VCID-qway-gm1y-yqcg |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1368 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96307 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96315 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96322 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96335 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96342 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96345 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96353 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.26753 |
| scoring_system |
epss |
| scoring_elements |
0.96359 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1368 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1368
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qway-gm1y-yqcg |
|
| 90 |
| url |
VCID-qxwq-vp9g-ukca |
| vulnerability_id |
VCID-qxwq-vp9g-ukca |
| summary |
In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03953 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03892 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03897 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03922 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0389 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03824 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2180 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-2180
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca |
|
| 91 |
| url |
VCID-r1q4-2dq2-33ca |
| vulnerability_id |
VCID-r1q4-2dq2-33ca |
| summary |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34980 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05391 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08209 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11495 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1162 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12462 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12431 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12391 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12291 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12469 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34980 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34980
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r1q4-2dq2-33ca |
|
| 92 |
| url |
VCID-rdkz-72eg-7ubd |
| vulnerability_id |
VCID-rdkz-72eg-7ubd |
| summary |
security flaw |
| references |
| 0 |
| reference_url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch |
|
| 1 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0064 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92334 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92317 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92323 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.08395 |
| scoring_system |
epss |
| scoring_elements |
0.92335 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0064 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0064
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rdkz-72eg-7ubd |
|
| 93 |
| url |
VCID-rkdd-spkc-y7gq |
| vulnerability_id |
VCID-rkdd-spkc-y7gq |
| summary |
Multiple vulnerabilities have been discovered in CUPS, allowing for the
remote execution of arbitrary code and a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0047 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96159 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96167 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96177 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96187 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.9619 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96194 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96197 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.96205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.25276 |
| scoring_system |
epss |
| scoring_elements |
0.9621 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0047 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0047
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rkdd-spkc-y7gq |
|
| 94 |
| url |
VCID-ry9y-z4e4-yfdh |
| vulnerability_id |
VCID-ry9y-z4e4-yfdh |
| summary |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34990 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01328 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01672 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02008 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02044 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02026 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02012 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34990 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34990
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ry9y-z4e4-yfdh |
|
| 95 |
| url |
VCID-s8wg-jbst-vqc3 |
| vulnerability_id |
VCID-s8wg-jbst-vqc3 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95964 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.9591 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95918 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.9593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95938 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95941 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95944 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95947 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95958 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.23252 |
| scoring_system |
epss |
| scoring_elements |
0.95962 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1267 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1267
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s8wg-jbst-vqc3 |
|
| 96 |
| url |
VCID-sv3r-4tym-qua5 |
| vulnerability_id |
VCID-sv3r-4tym-qua5 |
| summary |
Poppler and various KDE components are vulnerable to multiple memory
management issues possibly resulting in the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5393 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94355 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94364 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94374 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94375 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94389 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94392 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94408 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.14245 |
| scoring_system |
epss |
| scoring_elements |
0.94417 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5393 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5393
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5 |
|
| 97 |
| url |
VCID-txsp-9r9g-a3cp |
| vulnerability_id |
VCID-txsp-9r9g-a3cp |
| summary |
Buffer overflow in lpstat in SCO OpenServer 5.0 through 5.0.6a allows local users to execute arbitrary code as group bin via a long command line argument. |
| references |
| 0 |
| reference_url |
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.38/CSSA-2001-SCO.38.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.38/CSSA-2001-SCO.38.txt |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2001-1508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28173 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28307 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28379 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.2842 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28212 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28279 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28321 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28327 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28283 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28225 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28219 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2001-1508 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2001-1508
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-txsp-9r9g-a3cp |
|
| 98 |
| url |
VCID-u7u6-xk3g-a3ce |
| vulnerability_id |
VCID-u7u6-xk3g-a3ce |
| summary |
Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3640 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92639 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92589 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92595 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92601 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92602 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92613 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92618 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92624 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92637 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0901 |
| scoring_system |
epss |
| scoring_elements |
0.92636 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3640 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3640
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u7u6-xk3g-a3ce |
|
| 99 |
| url |
VCID-ucmb-we3r-aqcd |
| vulnerability_id |
VCID-ucmb-we3r-aqcd |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1159 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98202 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.9821 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98216 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.9822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98219 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98227 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.58776 |
| scoring_system |
epss |
| scoring_elements |
0.98224 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1159 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1159
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd |
|
| 100 |
| url |
VCID-ujum-g6at-v7hf |
| vulnerability_id |
VCID-ujum-g6at-v7hf |
| summary |
CUPS buffer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5848 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50558 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50512 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50563 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50605 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50568 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50609 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50614 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50592 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5848 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5848
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ujum-g6at-v7hf |
|
| 101 |
| url |
VCID-ujz5-t5xc-83e7 |
| vulnerability_id |
VCID-ujz5-t5xc-83e7 |
| summary |
Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4873 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78356 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78439 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78438 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78393 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78377 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78403 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78435 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.78418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0114 |
| scoring_system |
epss |
| scoring_elements |
0.7841 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01244 |
| scoring_system |
epss |
| scoring_elements |
0.79299 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4873 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-4873
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ujz5-t5xc-83e7 |
|
| 102 |
| url |
VCID-uka8-ug6a-dfg8 |
| vulnerability_id |
VCID-uka8-ug6a-dfg8 |
| summary |
cups: incomplete fix for CVE-2004-0888 / CVE-2005-0206 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1374 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84716 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.8475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84776 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84782 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.848 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84796 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84813 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02318 |
| scoring_system |
epss |
| scoring_elements |
0.84811 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1374 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1374
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uka8-ug6a-dfg8 |
|
| 103 |
| url |
VCID-ukec-69r2-xbef |
| vulnerability_id |
VCID-ukec-69r2-xbef |
| summary |
A buffer overflow in CUPS might allow remote attackers to execute
arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9679 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91732 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91673 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91682 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91687 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91696 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91715 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91721 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91717 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.91738 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.07364 |
| scoring_system |
epss |
| scoring_elements |
0.9173 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9679 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9679
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef |
|
| 104 |
| url |
VCID-uqp7-5pb9-w7cg |
| vulnerability_id |
VCID-uqp7-5pb9-w7cg |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1748 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93919 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93853 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93862 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93883 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93886 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.9389 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93891 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93912 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.12394 |
| scoring_system |
epss |
| scoring_elements |
0.93917 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1748 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-1748
|
| risk_score |
7.8 |
| exploitability |
2.0 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uqp7-5pb9-w7cg |
|
| 105 |
| url |
VCID-ur43-jbhj-k7bk |
| vulnerability_id |
VCID-ur43-jbhj-k7bk |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74471 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74475 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74501 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74508 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74523 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00829 |
| scoring_system |
epss |
| scoring_elements |
0.74545 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75784 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75763 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75757 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75795 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75798 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2432 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2432
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ur43-jbhj-k7bk |
|
| 106 |
| url |
VCID-utex-65f9-53cq |
| vulnerability_id |
VCID-utex-65f9-53cq |
| summary |
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
making them vulnerable to the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 1 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 2 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 3 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93555 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.9349 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93499 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93507 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93506 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93515 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93518 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93523 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93522 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93542 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.11286 |
| scoring_system |
epss |
| scoring_elements |
0.93548 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3625 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3625
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq |
|
| 107 |
| url |
VCID-uzg5-a999-afhp |
| vulnerability_id |
VCID-uzg5-a999-afhp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2305 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96506 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.9652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96524 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96532 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96534 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.9654 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96546 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96552 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.28664 |
| scoring_system |
epss |
| scoring_elements |
0.96555 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2305 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-2305
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uzg5-a999-afhp |
|
| 108 |
| url |
VCID-vca3-gr6w-bkc6 |
| vulnerability_id |
VCID-vca3-gr6w-bkc6 |
| summary |
A vulnerability in CUPS might allow for the execution of arbitrary code or
a Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88631 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.8864 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88657 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88658 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88681 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88693 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88686 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88687 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.887 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88697 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.04164 |
| scoring_system |
epss |
| scoring_elements |
0.88695 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1722 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1722
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vca3-gr6w-bkc6 |
|
| 109 |
| url |
VCID-vgtp-sjtt-73e9 |
| vulnerability_id |
VCID-vgtp-sjtt-73e9 |
| summary |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01562 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08917 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08839 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08908 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09815 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09793 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09776 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0966 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09632 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27447 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-27447
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vgtp-sjtt-73e9 |
|
| 110 |
| url |
VCID-vmjh-9kbz-qkh6 |
| vulnerability_id |
VCID-vmjh-9kbz-qkh6 |
| summary |
cups: Several XSS flaws in forms processed by CUPS web interface |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2820 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83564 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83591 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83625 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83642 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.8363 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83665 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01995 |
| scoring_system |
epss |
| scoring_elements |
0.83667 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2820 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2820
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjh-9kbz-qkh6 |
|
| 111 |
| url |
VCID-vx54-r2dt-8ue5 |
| vulnerability_id |
VCID-vx54-r2dt-8ue5 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10437 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10494 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10466 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10334 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10307 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4504
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5 |
|
| 112 |
| url |
VCID-w17y-dvuq-7ba6 |
| vulnerability_id |
VCID-w17y-dvuq-7ba6 |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27893 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27951 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27959 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27942 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39493 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39517 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39512 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39331 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4181 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-4181
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6 |
|
| 113 |
| url |
VCID-wjht-u5u1-kkas |
| vulnerability_id |
VCID-wjht-u5u1-kkas |
| summary |
cups: lppasswd vulnerability allows data access to unprivileged user |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6891 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.1417 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14244 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14305 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14116 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14197 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14098 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.13989 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14068 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6891 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6891
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas |
|
| 114 |
| url |
VCID-wpgs-8fw5-wbhe |
| vulnerability_id |
VCID-wpgs-8fw5-wbhe |
| summary |
Poppler and various KDE components are vulnerable to multiple memory
management issues possibly resulting in the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91109 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91117 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91129 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91143 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91144 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91168 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.06567 |
| scoring_system |
epss |
| scoring_elements |
0.91172 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5392 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5392
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe |
|
| 115 |
| url |
VCID-wqu4-wys6-hfbb |
| vulnerability_id |
VCID-wqu4-wys6-hfbb |
| summary |
cups: stack-buffer-overflow in libcups's asn1_get_type function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80607 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.8061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80613 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8675 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8675
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb |
|
| 116 |
| url |
VCID-wr17-e776-bqh1 |
| vulnerability_id |
VCID-wr17-e776-bqh1 |
| summary |
cups: Slow client communication leads to a possible DoS attack |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58436 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08299 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0829 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0813 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08266 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08216 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58436 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58436
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wr17-e776-bqh1 |
|
| 117 |
| url |
VCID-x49u-x3vn-f7gq |
| vulnerability_id |
VCID-x49u-x3vn-f7gq |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89008 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89024 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.8906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89054 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.04443 |
| scoring_system |
epss |
| scoring_elements |
0.89068 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0888 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-0888
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x49u-x3vn-f7gq |
|
| 118 |
| url |
VCID-xp1f-4p3v-67ad |
| vulnerability_id |
VCID-xp1f-4p3v-67ad |
| summary |
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2941 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95706 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95673 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95688 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95691 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95693 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.21353 |
| scoring_system |
epss |
| scoring_elements |
0.95701 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2941 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2941
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xp1f-4p3v-67ad |
|
| 119 |
| url |
VCID-xqh5-sxfb-gueh |
| vulnerability_id |
VCID-xqh5-sxfb-gueh |
| summary |
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
Poppler potentially resulting in the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch |
|
| 1 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt |
|
| 2 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt |
|
| 3 |
| reference_url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt |
|
| 4 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U |
|
| 5 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U |
|
| 6 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.9382 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93829 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93849 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93858 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.9388 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.12279 |
| scoring_system |
epss |
| scoring_elements |
0.93886 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3192 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3192
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh |
|
| 120 |
| url |
VCID-xyhn-ukg4-pyfm |
| vulnerability_id |
VCID-xyhn-ukg4-pyfm |
| summary |
Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98065 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98043 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98057 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98062 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.55181 |
| scoring_system |
epss |
| scoring_elements |
0.98069 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3641 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3641
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xyhn-ukg4-pyfm |
|
| 121 |
| url |
VCID-xzfh-46xf-p7gh |
| vulnerability_id |
VCID-xzfh-46xf-p7gh |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1366 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25499 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25536 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25308 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25376 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25421 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25344 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25305 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1366 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1366
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xzfh-46xf-p7gh |
|
| 122 |
| url |
VCID-y5s2-9j2f-jqa9 |
| vulnerability_id |
VCID-y5s2-9j2f-jqa9 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94826 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94836 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94839 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.9485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94855 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94859 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94871 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94874 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.16373 |
| scoring_system |
epss |
| scoring_elements |
0.94878 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0195 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0195
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5s2-9j2f-jqa9 |
|
| 123 |
| url |
VCID-y7a9-2p1n-z7fx |
| vulnerability_id |
VCID-y7a9-2p1n-z7fx |
| summary |
Multiple vulnerabilities have been found in GIMP, the worst of
which allow execution of arbitrary code or Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2896 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.9157 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91578 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91584 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91612 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91616 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91615 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91637 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.9163 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.07216 |
| scoring_system |
epss |
| scoring_elements |
0.91629 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2896 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2896
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx |
|
| 124 |
| url |
VCID-yfs7-zgxf-43hy |
| vulnerability_id |
VCID-yfs7-zgxf-43hy |
| summary |
Multiple vulnerabilities have been found in AMD64 x86 emulation
base libraries, the worst of which may allow remote execution of arbitrary
code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0720 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.95023 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94972 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94982 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94994 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.94998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.95003 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.95005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.95008 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.95016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.17144 |
| scoring_system |
epss |
| scoring_elements |
0.9502 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0720 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0720
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfs7-zgxf-43hy |
|
| 125 |
| url |
VCID-ymyr-d96v-dff9 |
| vulnerability_id |
VCID-ymyr-d96v-dff9 |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1372 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91655 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91662 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91668 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91677 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91689 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91699 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91702 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91719 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91711 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.07332 |
| scoring_system |
epss |
| scoring_elements |
0.91712 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1372 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1372
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymyr-d96v-dff9 |
|
| 126 |
| url |
VCID-ynvq-nzrq-9bca |
| vulnerability_id |
VCID-ynvq-nzrq-9bca |
| summary |
Multiple vulnerabilities have been found in Poppler, some of which
may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0146 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.8246 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82474 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82491 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82514 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82521 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.8254 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82536 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82531 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82568 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01745 |
| scoring_system |
epss |
| scoring_elements |
0.82572 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0146 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0146
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca |
|
| 127 |
| url |
VCID-yyrd-qt22-w3f5 |
| vulnerability_id |
VCID-yyrd-qt22-w3f5 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5031 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81847 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81742 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81752 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81772 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81799 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81805 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81812 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81807 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81844 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01618 |
| scoring_system |
epss |
| scoring_elements |
0.81845 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5031 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5031
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5 |
|
| 128 |
| url |
VCID-zjj3-g2d7-c3gd |
| vulnerability_id |
VCID-zjj3-g2d7-c3gd |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15400 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.6126 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.6134 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61369 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61407 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61388 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61431 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61413 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15400 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15400
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd |
|
| 129 |
| url |
VCID-zm2g-nduw-tfcy |
| vulnerability_id |
VCID-zm2g-nduw-tfcy |
| summary |
Multiple errors in CUPS might allow for the remote execution of arbitrary
code or DNS rebinding attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04186 |
| scoring_system |
epss |
| scoring_elements |
0.88716 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.04186 |
| scoring_system |
epss |
| scoring_elements |
0.88729 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.04186 |
| scoring_system |
epss |
| scoring_elements |
0.88727 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.04186 |
| scoring_system |
epss |
| scoring_elements |
0.88726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90426 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90392 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90439 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90432 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90395 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90407 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.05721 |
| scoring_system |
epss |
| scoring_elements |
0.90412 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0164 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0164
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zm2g-nduw-tfcy |
|
| 130 |
| url |
VCID-zt43-htwu-kfde |
| vulnerability_id |
VCID-zt43-htwu-kfde |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.34985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35212 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35137 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35163 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35168 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35133 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35108 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35145 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35131 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35082 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6553 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-6553
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde |
|
| 131 |
| url |
VCID-zxp7-6d69-tfhm |
| vulnerability_id |
VCID-zxp7-6d69-tfhm |
| summary |
cups: stack-buffer-overflow in libcups's asn1_get_packed function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80607 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.8061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80613 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8696 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8696
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm |
|