| 0 |
| url |
VCID-133h-9erq-2fhy |
| vulnerability_id |
VCID-133h-9erq-2fhy |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3946 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35625 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35681 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35646 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35676 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35527 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35754 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3946 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3946, GHSA-vccp-5v5h-p8m6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-133h-9erq-2fhy |
|
| 1 |
| url |
VCID-4auu-re6t-p3gu |
| vulnerability_id |
VCID-4auu-re6t-p3gu |
| summary |
Improper Authentication
The Authentication component in TYPO3 does not properly invalidate timed out user sessions, which allows remote attackers to bypass authentication via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3944 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40428 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40479 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.4049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40511 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40502 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.4047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40393 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.4048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40506 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3944 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3944, GHSA-9j8h-xrgj-7gw2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4auu-re6t-p3gu |
|
| 2 |
| url |
VCID-5rae-psy2-dba5 |
| vulnerability_id |
VCID-5rae-psy2-dba5 |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7076 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64757 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64808 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.648 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64881 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64843 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64892 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64878 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7076 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7076
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5rae-psy2-dba5 |
|
| 3 |
| url |
VCID-75re-n41m-y3et |
| vulnerability_id |
VCID-75re-n41m-y3et |
| summary |
TYPO3 Improper Access Control vulnerability
The (old) Form Content Element component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated editors to generate arbitrary HMAC signatures and bypass intended access restrictions via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7081 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38333 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38431 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38368 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38416 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38396 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38331 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38468 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38492 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38356 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38407 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7081 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7081, GHSA-r674-mc9p-hvw5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-75re-n41m-y3et |
|
| 4 |
| url |
VCID-8ahj-xadv-xbhr |
| vulnerability_id |
VCID-8ahj-xadv-xbhr |
| summary |
TYPO3 Cross-site scripting (XSS) vulnerability in the Extbase Framework
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in the Extbase Framework in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6, when the Rewritten Property Mapper is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message. NOTE: this might be the same vulnerability as CVE-2013-7072. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7078 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65431 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.6544 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65411 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65422 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65427 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65446 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65436 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65368 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65358 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7078 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7078, GHSA-qj69-chjp-g4f5
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ahj-xadv-xbhr |
|
| 5 |
| url |
VCID-9j2h-q1n5-kbgt |
| vulnerability_id |
VCID-9j2h-q1n5-kbgt |
| summary |
Typo3 XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3943 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43128 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43195 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43146 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43161 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43142 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43173 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43169 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.4316 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43107 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3943 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3943, GHSA-qqh2-h6gw-6x8x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9j2h-q1n5-kbgt |
|
| 6 |
| url |
VCID-d79s-4kzk-hugy |
| vulnerability_id |
VCID-d79s-4kzk-hugy |
| summary |
Typo3 Host Header Spoofing Vulnerability
TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3941 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51106 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51067 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51084 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.50973 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51026 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51105 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51008 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51062 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51065 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51089 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51112 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3941 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3941, GHSA-594h-cx6w-p4jf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d79s-4kzk-hugy |
|
| 7 |
| url |
VCID-ftr5-c6nt-gbh4 |
| vulnerability_id |
VCID-ftr5-c6nt-gbh4 |
| summary |
TYPO3 is vulnerable to Mass Assignment in the Extension table administration library
The creating record functionality in Extension table administration library (feuser_adminLib.inc) in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, and 6.0.0 through 6.0.11 allows remote attackers to write to arbitrary fields in the configuration database table via crafted links, aka "Mass Assignment." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50892 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50868 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50866 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50907 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50869 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50913 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50771 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50811 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7080 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7080, GHSA-5fj8-wh3g-qvq2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftr5-c6nt-gbh4 |
|
| 8 |
| url |
VCID-m3dg-q4eg-wyfb |
| vulnerability_id |
VCID-m3dg-q4eg-wyfb |
| summary |
TYPO3 Color Picker Wizard component allows remote authenticated editors to execute arbitrary PHP code
The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3942 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63249 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63279 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3942 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3942, GHSA-55g3-fjwm-w2c8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3dg-q4eg-wyfb |
|
| 9 |
| url |
VCID-mrst-4yau-ubce |
| vulnerability_id |
VCID-mrst-4yau-ubce |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3945 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41811 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41866 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41895 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41872 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41883 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41859 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41909 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3945 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3945, GHSA-h7wf-jg4f-x2wc
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mrst-4yau-ubce |
|
| 10 |
| url |
VCID-p8m8-y53c-cubn |
| vulnerability_id |
VCID-p8m8-y53c-cubn |
| summary |
TYPO3 vulnerable to Information Disclosure via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50906 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50988 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.51009 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.51003 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50981 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50864 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50948 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.51002 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.5096 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00275 |
| scoring_system |
epss |
| scoring_elements |
0.50963 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7073 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7073, GHSA-4rpv-g4gq-rh4m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p8m8-y53c-cubn |
|
| 11 |
| url |
VCID-vgwd-1z7m-gkh8 |
| vulnerability_id |
VCID-vgwd-1z7m-gkh8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2047 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73405 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73413 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73437 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73446 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73459 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73482 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73496 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73505 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73498 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2047 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-2047
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vgwd-1z7m-gkh8 |
|
| 12 |
| url |
VCID-wxg4-7yap-3qdx |
| vulnerability_id |
VCID-wxg4-7yap-3qdx |
| summary |
cross-site scripting |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1464 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87658 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.8759 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87616 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87635 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87641 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87653 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.87645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0352 |
| scoring_system |
epss |
| scoring_elements |
0.8766 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1464 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1464
|
| risk_score |
7.8 |
| exploitability |
2.0 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wxg4-7yap-3qdx |
|
| 13 |
| url |
VCID-y9d1-wwne-hba5 |
| vulnerability_id |
VCID-y9d1-wwne-hba5 |
| summary |
several |
| references |
| 0 |
| reference_url |
http://osvdb.org/100881 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N |
|
| 1 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://osvdb.org/100881 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56361 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56355 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56363 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56379 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56403 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56336 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56223 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00335 |
| scoring_system |
epss |
| scoring_elements |
0.56333 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7074 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7074, GHSA-r8m7-792j-5jvq
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9d1-wwne-hba5 |
|
| 14 |
| url |
VCID-yadx-n3tq-rkdb |
| vulnerability_id |
VCID-yadx-n3tq-rkdb |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52009 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51997 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52029 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51871 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51919 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51946 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.5191 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7079 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7079, GHSA-838c-v5cq-hp33
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yadx-n3tq-rkdb |
|
| 15 |
| url |
VCID-zqqe-vew2-nbfk |
| vulnerability_id |
VCID-zqqe-vew2-nbfk |
| summary |
TYPO3 vulnerable to Insecure Unserialize via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated backend users to unserialize arbitrary PHP objects, delete arbitrary files, and possibly have other unspecified impacts via an unspecified parameter, related to a "missing signature." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7075 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61209 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.6106 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61132 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.6118 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61195 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61202 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61183 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61228 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7075 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7075, GHSA-47ww-mq32-g4xw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zqqe-vew2-nbfk |
|