| Fixing_vulnerabilities |
| 0 |
| url |
VCID-1szy-64t4-2bab |
| vulnerability_id |
VCID-1szy-64t4-2bab |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1938 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79374 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79263 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.7927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79294 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.7928 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79339 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79322 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79311 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79338 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79334 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79335 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.01248 |
| scoring_system |
epss |
| scoring_elements |
0.79368 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1938 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1938
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1szy-64t4-2bab |
|
| 1 |
| url |
VCID-5y7y-3fnf-cueh |
| vulnerability_id |
VCID-5y7y-3fnf-cueh |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1945 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.40988 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41185 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41216 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41142 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41199 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.4122 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41187 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41173 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41114 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00192 |
| scoring_system |
epss |
| scoring_elements |
0.41003 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1945 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1945
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-3fnf-cueh |
|
| 2 |
| url |
VCID-8q4m-rkhj-5fhj |
| vulnerability_id |
VCID-8q4m-rkhj-5fhj |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1964 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75756 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75625 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75627 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75658 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75637 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75672 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75707 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75688 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.7572 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75724 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.7571 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.7575 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1964 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1964
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8q4m-rkhj-5fhj |
|
| 3 |
| url |
VCID-bfd8-7p4k-abae |
| vulnerability_id |
VCID-bfd8-7p4k-abae |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87779 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87689 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87711 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87713 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87735 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87751 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87745 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87744 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87758 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87757 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87756 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.03581 |
| scoring_system |
epss |
| scoring_elements |
0.87773 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0441 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0441
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bfd8-7p4k-abae |
|
| 4 |
| url |
VCID-cq4q-mh6g-aub7 |
| vulnerability_id |
VCID-cq4q-mh6g-aub7 |
| summary |
Security researcher Adam Barth found that inline event handlers, such as onclick, were no longer blocked by Content Security
Policy's (CSP) inline-script blocking feature. Web applications relying on this feature of CSP to protect against cross-site scripting (XSS) were not fully protected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1944 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71993 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71873 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.7188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71899 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71871 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.7191 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71921 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71952 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71941 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71986 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1944 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1944
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cq4q-mh6g-aub7 |
|
| 5 |
| url |
VCID-gjxf-vn2v-pkcp |
| vulnerability_id |
VCID-gjxf-vn2v-pkcp |
| summary |
Security researcher Robert Kugler discovered that in some
instances the Mozilla Maintenance Service on Windows will be vulnerable to some
previously fixed privilege escalation attacks that allowed for local privilege
escalation. This was caused by the Mozilla Updater not updating Windows Registry
entries for the Mozilla Maintenance Service, which fixed the earlier issues
present if Firefox 12 had been installed. New installations of Firefox after
version 12 are not affected by this issue. Local file system access is necessary
in order for this issue to be exploitable and it cannot be triggered through web
content. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1942 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13768 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13777 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13799 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13852 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13934 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13793 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13928 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13885 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13849 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1371 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13705 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1942 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1942
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gjxf-vn2v-pkcp |
|
| 6 |
| url |
VCID-s3m1-pnhd-n3ex |
| vulnerability_id |
VCID-s3m1-pnhd-n3ex |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91347 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91265 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91279 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91298 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91304 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91311 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91314 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91338 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91337 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.06784 |
| scoring_system |
epss |
| scoring_elements |
0.91348 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1947 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1947
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s3m1-pnhd-n3ex |
|
| 7 |
| url |
VCID-v5y5-u355-mbdd |
| vulnerability_id |
VCID-v5y5-u355-mbdd |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1946 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80853 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80727 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80736 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80757 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80754 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80782 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80791 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80807 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80792 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80784 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.8082 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80823 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80824 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.01451 |
| scoring_system |
epss |
| scoring_elements |
0.80847 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1946 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1946
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v5y5-u355-mbdd |
|
|