| 0 |
| url |
VCID-1mw1-384y-huc7 |
| vulnerability_id |
VCID-1mw1-384y-huc7 |
| summary |
Uncontrolled Resource Consumption
Algorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2099 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89929 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.8997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89969 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89983 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.8998 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2099 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2099
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1mw1-384y-huc7 |
|
| 1 |
| url |
VCID-1yu9-avtx-cybv |
| vulnerability_id |
VCID-1yu9-avtx-cybv |
| summary |
foreman: API not scoping resources to taxonomies |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1844 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49444 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49473 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49499 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49452 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49507 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49503 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4952 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49491 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49541 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49539 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4951 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1844 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1844
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1yu9-avtx-cybv |
|
| 2 |
| url |
VCID-77c9-jb1m-6qe2 |
| vulnerability_id |
VCID-77c9-jb1m-6qe2 |
| summary |
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94968 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94978 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94989 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94992 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94995 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0203
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-77c9-jb1m-6qe2 |
|
| 3 |
| url |
VCID-7f1h-1fw8-k7c4 |
| vulnerability_id |
VCID-7f1h-1fw8-k7c4 |
| summary |
foreman: the _session_id cookie is issued without the Secure flag |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3155 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68193 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68209 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68275 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.683 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68254 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68294 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68305 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0056 |
| scoring_system |
epss |
| scoring_elements |
0.68285 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3155 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3155
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f1h-1fw8-k7c4 |
|
| 4 |
| url |
VCID-8wen-twwa-8khm |
| vulnerability_id |
VCID-8wen-twwa-8khm |
| summary |
foreman: cross-site scripting (XSS) flaw in template preview screen |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3653 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59891 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59968 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59993 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60013 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60026 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60047 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60032 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60014 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60054 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60046 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3653 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3653
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8wen-twwa-8khm |
|
| 5 |
| url |
VCID-9gb8-xvrc-aqgb |
| vulnerability_id |
VCID-9gb8-xvrc-aqgb |
| summary |
qpid-cpp: anonymous access to qpidd cannot be prevented |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84587 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84601 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84645 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84669 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84664 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84681 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84682 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84683 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0223
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9gb8-xvrc-aqgb |
|
| 6 |
| url |
VCID-f5vu-k9rc-27fz |
| vulnerability_id |
VCID-f5vu-k9rc-27fz |
| summary |
Improper Validation of Array Index
Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-4616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68192 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68098 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.6812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68116 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68182 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68194 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68199 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.6821 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-4616 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-4616, GHSA-9772-cwx9-r4cj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f5vu-k9rc-27fz |
|
| 7 |
| url |
VCID-fq2t-c2nv-23ce |
| vulnerability_id |
VCID-fq2t-c2nv-23ce |
| summary |
A vulnerability in MongoDB can lead to a Denial of Service
condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82181 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82238 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82245 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82264 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82288 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82289 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1609 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1609
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fq2t-c2nv-23ce |
|
| 8 |
| url |
VCID-jfqz-9a6e-jff7 |
| vulnerability_id |
VCID-jfqz-9a6e-jff7 |
| summary |
foreman: Unprivileged user can access private bookmarks of other users |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42201 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42269 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42226 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42276 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4227 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42293 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2100 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2100
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfqz-9a6e-jff7 |
|
| 9 |
| url |
VCID-rc65-py17-kuhm |
| vulnerability_id |
VCID-rc65-py17-kuhm |
| summary |
foreman: lack of SSL certificate validation when performing LDAPS authentication |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1816 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44212 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44279 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44235 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44287 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44292 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44277 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44335 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00217 |
| scoring_system |
epss |
| scoring_elements |
0.44254 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1816 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1816
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rc65-py17-kuhm |
|
| 10 |
| url |
VCID-sqjb-qpyd-p7gn |
| vulnerability_id |
VCID-sqjb-qpyd-p7gn |
| summary |
foreman: edit_users permission allows changing of admin passwords |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.6854 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68558 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68605 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68631 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68618 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0057 |
| scoring_system |
epss |
| scoring_elements |
0.68639 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3235 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3235
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sqjb-qpyd-p7gn |
|
| 11 |
| url |
VCID-tbug-mv5x-uucb |
| vulnerability_id |
VCID-tbug-mv5x-uucb |
| summary |
The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4346 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64597 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64672 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64661 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64625 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64653 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64665 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64648 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64584 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64626 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64544 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65986 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4346 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/joestump/python-oauth2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/joestump/python-oauth2 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4346, GHSA-4433-4cxq-vv73, PYSEC-2014-85
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbug-mv5x-uucb |
|
| 12 |
| url |
VCID-utxw-251d-gfff |
| vulnerability_id |
VCID-utxw-251d-gfff |
| summary |
rhn_satellite_6: cross-site request forgery (CSRF) can force logout |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3590 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47402 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47436 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47457 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47407 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47461 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47522 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47514 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47467 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3590 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3590
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-utxw-251d-gfff |
|
| 13 |
| url |
VCID-vhxh-tpay-mbh3 |
| vulnerability_id |
VCID-vhxh-tpay-mbh3 |
| summary |
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98106 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.9811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.9809 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98095 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98096 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98101 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98102 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98108 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0224 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0224
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vhxh-tpay-mbh3 |
|
| 14 |
| url |
VCID-zkgb-14kz-33dz |
| vulnerability_id |
VCID-zkgb-14kz-33dz |
| summary |
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4347 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61355 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61445 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61441 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61421 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.614 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61276 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62677 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4347 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/joestump/python-oauth2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/joestump/python-oauth2 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
http://www.securityfocus.com/bid/62388 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.securityfocus.com/bid/62388 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4347, GHSA-rv8h-p43r-4x5r, PYSEC-2014-86
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zkgb-14kz-33dz |
|