| 0 |
| url |
VCID-23v6-x6d6-buca |
| vulnerability_id |
VCID-23v6-x6d6-buca |
| summary |
A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9805 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61942 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61783 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61956 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.6196 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61857 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61887 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61907 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61933 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00419 |
| scoring_system |
epss |
| scoring_elements |
0.61913 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9805 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9805
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-23v6-x6d6-buca |
|
| 1 |
| url |
VCID-4555-zn45-mfd8 |
| vulnerability_id |
VCID-4555-zn45-mfd8 |
| summary |
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9806 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56858 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56742 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56884 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56881 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56836 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56885 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56888 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56897 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56877 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56854 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9806 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9806
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4555-zn45-mfd8 |
|
| 2 |
| url |
VCID-7aua-26jh-y3cr |
| vulnerability_id |
VCID-7aua-26jh-y3cr |
| summary |
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9799 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46296 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46365 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46422 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46355 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46304 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46359 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.4636 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46384 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9799 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9799
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7aua-26jh-y3cr |
|
| 3 |
| url |
VCID-7yw2-2r4n-rugg |
| vulnerability_id |
VCID-7yw2-2r4n-rugg |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9790 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7236 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72321 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72363 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72372 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72274 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72327 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9790 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9790
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yw2-2r4n-rugg |
|
| 4 |
| url |
VCID-a2k9-85qx-u7cy |
| vulnerability_id |
VCID-a2k9-85qx-u7cy |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9788 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83961 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83959 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83867 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83881 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83897 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83899 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.02068 |
| scoring_system |
epss |
| scoring_elements |
0.83922 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9788 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9788
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a2k9-85qx-u7cy |
|
| 5 |
| url |
VCID-bxng-uq7z-hubn |
| vulnerability_id |
VCID-bxng-uq7z-hubn |
| summary |
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9803 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31323 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31335 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31372 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31351 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31474 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31515 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31333 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31421 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31377 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31339 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9803 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9803
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bxng-uq7z-hubn |
|
| 6 |
| url |
VCID-drcd-xhd2-27hn |
| vulnerability_id |
VCID-drcd-xhd2-27hn |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9793 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60864 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60865 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60851 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60833 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.6088 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60713 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60778 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00402 |
| scoring_system |
epss |
| scoring_elements |
0.60844 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9793 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9793
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drcd-xhd2-27hn |
|
| 7 |
| url |
VCID-f2z3-egzk-efgj |
| vulnerability_id |
VCID-f2z3-egzk-efgj |
| summary |
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9808 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25746 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25879 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25791 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25774 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25943 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25874 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25886 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25845 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25789 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9808 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9808
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f2z3-egzk-efgj |
|
| 8 |
| url |
VCID-g45q-v1td-9qcz |
| vulnerability_id |
VCID-g45q-v1td-9qcz |
| summary |
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9802 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43673 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4375 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4374 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43704 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43729 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43663 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43713 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43716 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43736 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43688 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9802 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9802
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g45q-v1td-9qcz |
|
| 9 |
| url |
VCID-gyt6-vfya-pueg |
| vulnerability_id |
VCID-gyt6-vfya-pueg |
| summary |
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9807 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42115 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42111 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42184 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4217 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42188 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42199 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42222 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42185 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42158 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9807 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9807
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gyt6-vfya-pueg |
|
| 10 |
| url |
VCID-rhzx-ha7x-dfew |
| vulnerability_id |
VCID-rhzx-ha7x-dfew |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9791 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97231 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97212 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97216 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97225 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97228 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97188 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97194 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.38066 |
| scoring_system |
epss |
| scoring_elements |
0.97211 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9791 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9791
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhzx-ha7x-dfew |
|
| 11 |
| url |
VCID-t1cv-pb54-xyge |
| vulnerability_id |
VCID-t1cv-pb54-xyge |
| summary |
Mozilla developers and community members Dragana Damjanovic, Emilio Cobos Álvarez, Henri Sivonen, Narcis Beleuzu, Julian Seward, Marcia Knous, Gary Kwong, Tyson Smith, Yaron Tausky, Ronald Crane, and André Bargull reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9789 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6332 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63211 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63298 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63341 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6327 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63265 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63316 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63334 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63335 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9789 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9789
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cv-pb54-xyge |
|
| 12 |
| url |
VCID-tff1-6wkz-jyar |
| vulnerability_id |
VCID-tff1-6wkz-jyar |
| summary |
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9797 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65139 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65146 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65109 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65145 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65155 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65024 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65075 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65101 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65065 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65114 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00481 |
| scoring_system |
epss |
| scoring_elements |
0.65127 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9797 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9797
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tff1-6wkz-jyar |
|
| 13 |
| url |
VCID-vrvn-krwb-d3dr |
| vulnerability_id |
VCID-vrvn-krwb-d3dr |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7236 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72321 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72363 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72372 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72274 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72327 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9795
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vrvn-krwb-d3dr |
|
| 14 |
| url |
VCID-wwck-cpa8-y3c5 |
| vulnerability_id |
VCID-wwck-cpa8-y3c5 |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9792 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95317 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.953 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95309 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95263 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95274 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95279 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95284 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.18866 |
| scoring_system |
epss |
| scoring_elements |
0.95292 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9792 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9792
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wwck-cpa8-y3c5 |
|
| 15 |
| url |
VCID-x4sm-zyc1-ffd4 |
| vulnerability_id |
VCID-x4sm-zyc1-ffd4 |
| summary |
Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7236 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72321 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72363 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72372 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72274 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.7228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00714 |
| scoring_system |
epss |
| scoring_elements |
0.72327 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9796 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9796
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x4sm-zyc1-ffd4 |
|
| 16 |
| url |
VCID-zcdh-q78g-x7gr |
| vulnerability_id |
VCID-zcdh-q78g-x7gr |
| summary |
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64914 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65034 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65044 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64954 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65003 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.65025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00478 |
| scoring_system |
epss |
| scoring_elements |
0.64997 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9809 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9809
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zcdh-q78g-x7gr |
|