| 0 |
| url |
VCID-cs4a-sme5-7yha |
| vulnerability_id |
VCID-cs4a-sme5-7yha |
| summary |
Multiple vulnerabilities have been found in GNU C Library, the
worst of which allowing arbitrary code execution and privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51609 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5148 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51532 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51559 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51519 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51599 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51624 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51631 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0536 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0536
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cs4a-sme5-7yha |
|
| 1 |
| url |
VCID-dgmx-612a-eqfq |
| vulnerability_id |
VCID-dgmx-612a-eqfq |
| summary |
Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38604 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28049 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27919 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27968 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27985 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28034 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28077 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.2807 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28164 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.2796 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38604 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-38604
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dgmx-612a-eqfq |
|
| 2 |
| url |
VCID-duv1-qtpd-ybdg |
| vulnerability_id |
VCID-duv1-qtpd-ybdg |
| summary |
glibc: vDSO getrandom acceleration may return predictable randomness |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0577 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01538 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01436 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03554 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03564 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03586 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03563 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0354 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0577 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0577
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-duv1-qtpd-ybdg |
|
| 3 |
| url |
VCID-et4n-9tuq-k3ct |
| vulnerability_id |
VCID-et4n-9tuq-k3ct |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6246 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25481 |
| scoring_system |
epss |
| scoring_elements |
0.96234 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.25481 |
| scoring_system |
epss |
| scoring_elements |
0.96219 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.25481 |
| scoring_system |
epss |
| scoring_elements |
0.96221 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.25481 |
| scoring_system |
epss |
| scoring_elements |
0.96229 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.25481 |
| scoring_system |
epss |
| scoring_elements |
0.96233 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.26964 |
| scoring_system |
epss |
| scoring_elements |
0.9634 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.26964 |
| scoring_system |
epss |
| scoring_elements |
0.96356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.26964 |
| scoring_system |
epss |
| scoring_elements |
0.96348 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.26964 |
| scoring_system |
epss |
| scoring_elements |
0.96344 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.26964 |
| scoring_system |
epss |
| scoring_elements |
0.9636 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6246 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6246
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-et4n-9tuq-k3ct |
|
| 4 |
| url |
VCID-jkcw-geyg-t3e5 |
| vulnerability_id |
VCID-jkcw-geyg-t3e5 |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.4403 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44092 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.4406 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44044 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44105 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44096 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.4625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46231 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46198 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6780
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jkcw-geyg-t3e5 |
|
| 5 |
| url |
VCID-k8c9-hx6q-mbfq |
| vulnerability_id |
VCID-k8c9-hx6q-mbfq |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71659 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.7167 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71694 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71677 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71658 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71702 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.71708 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00685 |
| scoring_system |
epss |
| scoring_elements |
0.7169 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39046 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-39046
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k8c9-hx6q-mbfq |
|
| 6 |
| url |
VCID-kb2y-nbd3-mudm |
| vulnerability_id |
VCID-kb2y-nbd3-mudm |
| summary |
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.9152 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91456 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91462 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91469 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91477 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.9149 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91496 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91501 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91503 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91524 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07054 |
| scoring_system |
epss |
| scoring_elements |
0.91519 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0537 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0537
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kb2y-nbd3-mudm |
|
| 7 |
| url |
VCID-mneq-btk4-5be2 |
| vulnerability_id |
VCID-mneq-btk4-5be2 |
| summary |
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2702 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87342 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87329 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87344 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87347 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.8732 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87327 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03354 |
| scoring_system |
epss |
| scoring_elements |
0.87339 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04486 |
| scoring_system |
epss |
| scoring_elements |
0.89068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.04486 |
| scoring_system |
epss |
| scoring_elements |
0.89083 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.04486 |
| scoring_system |
epss |
| scoring_elements |
0.89059 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2702 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2702
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mneq-btk4-5be2 |
|
| 8 |
| url |
VCID-mt2t-g9ge-pfgz |
| vulnerability_id |
VCID-mt2t-g9ge-pfgz |
| summary |
glibc: nscd client crash on x86_64 under high nscd load |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02416 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02594 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02608 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02635 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02319 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3904
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mt2t-g9ge-pfgz |
|
| 9 |
| url |
VCID-mxa4-rpev-nkhw |
| vulnerability_id |
VCID-mxa4-rpev-nkhw |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0403 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15377 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15493 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15534 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15605 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15407 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15494 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15508 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15325 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0403 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0403
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxa4-rpev-nkhw |
|
| 10 |
|
| 11 |
| url |
VCID-pnk4-ss5m-d3an |
| vulnerability_id |
VCID-pnk4-ss5m-d3an |
| summary |
glibc: calloc may return non-zero memory |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.7702 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.77025 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.77027 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76921 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76928 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76939 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.7701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76989 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.01 |
| scoring_system |
epss |
| scoring_elements |
0.76984 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5229 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5229
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pnk4-ss5m-d3an |
|
| 12 |
| url |
VCID-pw6m-42j9-f7af |
| vulnerability_id |
VCID-pw6m-42j9-f7af |
| summary |
Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3998 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41859 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41805 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41794 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41888 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41866 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.419 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41865 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41903 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3998 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3998
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pw6m-42j9-f7af |
|
| 13 |
| url |
VCID-pz43-weh8-cqgj |
| vulnerability_id |
VCID-pz43-weh8-cqgj |
| summary |
glibc: Vector register overwrite bug in glibc |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5702 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52452 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.5254 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52551 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52556 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.5248 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52447 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52499 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52493 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52544 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52528 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5702 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5702
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pz43-weh8-cqgj |
|
| 14 |
| url |
VCID-q3am-4g9r-rffg |
| vulnerability_id |
VCID-q3am-4g9r-rffg |
| summary |
glibc: incorrect printf output for integers with thousands separator and width field |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25139 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35951 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36011 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3604 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36002 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36001 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36096 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36126 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25139 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25139
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q3am-4g9r-rffg |
|
| 15 |
| url |
VCID-qeyh-2f6t-bbbb |
| vulnerability_id |
VCID-qeyh-2f6t-bbbb |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5156 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1714 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18199 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18204 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18157 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18106 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18049 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18061 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5156 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5156
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyh-2f6t-bbbb |
|
| 16 |
| url |
VCID-sphp-4b55-9fer |
| vulnerability_id |
VCID-sphp-4b55-9fer |
| summary |
glibc: Vector register overwrite bug in glibc |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48792 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48828 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48872 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48869 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48817 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48771 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48823 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.4884 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5745 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5745
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sphp-4b55-9fer |
|
| 17 |
| url |
VCID-tgp7-xmws-kued |
| vulnerability_id |
VCID-tgp7-xmws-kued |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70944 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70958 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00654 |
| scoring_system |
epss |
| scoring_elements |
0.70965 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72203 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72227 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72178 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6779 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6779
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tgp7-xmws-kued |
|
| 18 |
| url |
VCID-w16u-mjyw-pben |
| vulnerability_id |
VCID-w16u-mjyw-pben |
| summary |
Multiple vulnerabilities in glibc could result in Local Privilege Escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4527 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28657 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28565 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28613 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28694 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28743 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2855 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28615 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29006 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4527 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4527
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w16u-mjyw-pben |
|
| 19 |
| url |
VCID-z55w-t8kd-hqep |
| vulnerability_id |
VCID-z55w-t8kd-hqep |
| summary |
glibc: Integer overflow with enabled tcache |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17426 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57899 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58016 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.5804 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58039 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57983 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58002 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58033 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58052 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58031 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.5801 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17426 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17426
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z55w-t8kd-hqep |
|