| 0 |
| url |
VCID-1f7s-dk69-mqg2 |
| vulnerability_id |
VCID-1f7s-dk69-mqg2 |
| summary |
The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the "Change block" text. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6727 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.60993 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61069 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61097 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61063 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61111 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61127 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61148 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61134 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61156 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61162 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61144 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6727 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-6727
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1f7s-dk69-mqg2 |
|
| 1 |
| url |
VCID-1hwd-avxk-fqbs |
| vulnerability_id |
VCID-1hwd-avxk-fqbs |
| summary |
The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62879 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.629 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62748 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62806 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62799 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.6285 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62885 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62874 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62852 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00435 |
| scoring_system |
epss |
| scoring_elements |
0.62892 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8628 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8628
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1hwd-avxk-fqbs |
|
| 2 |
| url |
VCID-2fva-bc2j-dban |
| vulnerability_id |
VCID-2fva-bc2j-dban |
| summary |
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66897 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66795 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66859 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66831 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.6688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66913 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.669 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66914 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8003 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8003
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2fva-bc2j-dban |
|
| 3 |
| url |
VCID-3yt6-jnfb-9fcw |
| vulnerability_id |
VCID-3yt6-jnfb-9fcw |
| summary |
MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly normalize IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62547 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62565 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62409 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62467 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62498 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62517 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62541 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62518 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00429 |
| scoring_system |
epss |
| scoring_elements |
0.62559 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8627 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8627
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3yt6-jnfb-9fcw |
|
| 4 |
| url |
VCID-5fsv-cduw-ybb8 |
| vulnerability_id |
VCID-5fsv-cduw-ybb8 |
| summary |
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48661 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48588 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.4863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48604 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48658 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48704 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8005 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8005
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5fsv-cduw-ybb8 |
|
| 5 |
| url |
VCID-cm78-savr-xuf7 |
| vulnerability_id |
VCID-cm78-savr-xuf7 |
| summary |
Multiple vulnerabilities have been found in MediaWiki, the worst of
which may allow remote attackers to cause a Denial of Service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6730 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51365 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51443 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51455 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51496 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51505 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.51513 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00281 |
| scoring_system |
epss |
| scoring_elements |
0.5149 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6730 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-6730
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cm78-savr-xuf7 |
|
| 6 |
| url |
VCID-e2td-jqbd-vbaa |
| vulnerability_id |
VCID-e2td-jqbd-vbaa |
| summary |
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8624 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30249 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30294 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30405 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30481 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.3029 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.3035 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30384 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30387 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30296 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30312 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8624 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8624
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e2td-jqbd-vbaa |
|
| 7 |
| url |
VCID-fujm-vb7d-vfhe |
| vulnerability_id |
VCID-fujm-vb7d-vfhe |
| summary |
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66897 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66795 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66859 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66831 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.6688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66913 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.669 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00522 |
| scoring_system |
epss |
| scoring_elements |
0.66914 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8002 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8002
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fujm-vb7d-vfhe |
|
| 8 |
| url |
VCID-mzd9-bu4b-wfar |
| vulnerability_id |
VCID-mzd9-bu4b-wfar |
| summary |
The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the "Change block" text. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63607 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63666 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63692 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63703 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.6372 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63734 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63686 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63715 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7444 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7444
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mzd9-bu4b-wfar |
|
| 9 |
| url |
VCID-nsd6-kt5p-w7fe |
| vulnerability_id |
VCID-nsd6-kt5p-w7fe |
| summary |
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named "javascript:alert('XSS!')." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53607 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53487 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53511 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53536 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53555 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53551 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53601 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53565 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8622 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8622
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nsd6-kt5p-w7fe |
|
| 10 |
| url |
VCID-qme5-cvje-1fg4 |
| vulnerability_id |
VCID-qme5-cvje-1fg4 |
| summary |
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36779 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36929 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36962 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36844 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36859 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36868 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36833 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36808 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36853 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36837 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8004 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8004
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qme5-cvje-1fg4 |
|
| 11 |
| url |
VCID-rhq2-r3hq-tqc5 |
| vulnerability_id |
VCID-rhq2-r3hq-tqc5 |
| summary |
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55476 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55318 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55432 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55435 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55487 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55497 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55495 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55498 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8001 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8001
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhq2-r3hq-tqc5 |
|
| 12 |
| url |
VCID-xj9q-7kq3-x7b4 |
| vulnerability_id |
VCID-xj9q-7kq3-x7b4 |
| summary |
Multiple vulnerabilities have been found in MediaWiki, the worst of
which may allow remote attackers to cause a Denial of Service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36539 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36711 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36742 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.3658 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.3665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36624 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36599 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36645 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36627 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36568 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6728 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-6728
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xj9q-7kq3-x7b4 |
|
| 13 |
| url |
VCID-yc9s-xn4z-jbde |
| vulnerability_id |
VCID-yc9s-xn4z-jbde |
| summary |
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32158 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32145 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32275 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32187 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32214 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32216 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32179 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8623 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8623
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yc9s-xn4z-jbde |
|
| 14 |
| url |
VCID-zhp6-af71-57gk |
| vulnerability_id |
VCID-zhp6-af71-57gk |
| summary |
The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70629 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70651 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70533 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70547 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70564 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70541 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70587 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70625 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.7061 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70596 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00642 |
| scoring_system |
epss |
| scoring_elements |
0.70641 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8626 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8626
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zhp6-af71-57gk |
|