| 0 |
| url |
VCID-12nz-jt4k-afdm |
| vulnerability_id |
VCID-12nz-jt4k-afdm |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4029 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80581 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80603 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80596 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80633 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.8065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80637 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80628 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80657 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80659 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80661 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4029 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4029
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12nz-jt4k-afdm |
|
| 1 |
| url |
VCID-14w4-eqhq-zuhu |
| vulnerability_id |
VCID-14w4-eqhq-zuhu |
| summary |
A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61517 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61591 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.6162 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.6164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61654 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61676 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00415 |
| scoring_system |
epss |
| scoring_elements |
0.61691 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1762 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1762
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-14w4-eqhq-zuhu |
|
| 2 |
| url |
VCID-198e-9yps-nqfz |
| vulnerability_id |
VCID-198e-9yps-nqfz |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5491 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8177 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81803 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81834 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81841 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81835 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81872 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5491 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5491
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-198e-9yps-nqfz |
|
| 3 |
| url |
VCID-1axp-38yu-wua1 |
| vulnerability_id |
VCID-1axp-38yu-wua1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5489 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.665 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66388 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66427 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66494 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66497 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66515 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5489 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5489
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1axp-38yu-wua1 |
|
| 4 |
| url |
VCID-1by8-54pr-ubcw |
| vulnerability_id |
VCID-1by8-54pr-ubcw |
| summary |
In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91313 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91317 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91328 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91335 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91361 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91364 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91363 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91389 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.06854 |
| scoring_system |
epss |
| scoring_elements |
0.91387 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4046 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4046
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1by8-54pr-ubcw |
|
| 5 |
| url |
VCID-1cad-s6nn-j7aw |
| vulnerability_id |
VCID-1cad-s6nn-j7aw |
| summary |
embedded prototype.js JavaScript hijacking |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49583 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49489 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49498 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49553 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49548 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49565 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49539 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49585 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2383 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-2383
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1cad-s6nn-j7aw |
|
| 6 |
| url |
VCID-1cp7-76kz-47ed |
| vulnerability_id |
VCID-1cp7-76kz-47ed |
| summary |
Cross-site scripting (XSS) vulnerability in functions.php in the default theme in WordPress 2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to wp-admin/themes.php, a different vulnerability than CVE-2007-1622. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.8098 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80882 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80911 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80939 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80948 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.8095 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80942 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80978 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01473 |
| scoring_system |
epss |
| scoring_elements |
0.80979 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3238 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3238
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1cp7-76kz-47ed |
|
| 7 |
| url |
VCID-1hu7-2yjp-m7b8 |
| vulnerability_id |
VCID-1hu7-2yjp-m7b8 |
| summary |
Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Various security hardening." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78227 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.7824 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78267 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78273 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78281 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78307 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.78304 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01125 |
| scoring_system |
epss |
| scoring_elements |
0.783 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3125 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3125
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1hu7-2yjp-m7b8 |
|
| 8 |
| url |
VCID-1j31-f88g-kfe7 |
| vulnerability_id |
VCID-1j31-f88g-kfe7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29450 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.84014 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83917 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83932 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83948 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83951 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83974 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83981 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83997 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.83986 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.8401 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0208 |
| scoring_system |
epss |
| scoring_elements |
0.84012 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29450 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-29450
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1j31-f88g-kfe7 |
|
| 9 |
| url |
VCID-1tvf-ywk8-5yh5 |
| vulnerability_id |
VCID-1tvf-ywk8-5yh5 |
| summary |
wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73073 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.7316 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73063 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73117 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73142 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73122 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73168 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73093 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73067 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73104 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6016 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-6016
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1tvf-ywk8-5yh5 |
|
| 10 |
| url |
VCID-1tw6-axgs-f3hy |
| vulnerability_id |
VCID-1tw6-axgs-f3hy |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11027 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97437 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97444 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97449 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.9745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97456 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97461 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97472 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.42551 |
| scoring_system |
epss |
| scoring_elements |
0.97475 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11027 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11027
|
| risk_score |
0.8 |
| exploitability |
2.0 |
| weighted_severity |
0.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1tw6-axgs-f3hy |
|
| 11 |
| url |
VCID-1z8j-st48-qkgn |
| vulnerability_id |
VCID-1z8j-st48-qkgn |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14718 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85756 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85671 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85737 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85751 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14718 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14718
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8j-st48-qkgn |
|
| 12 |
| url |
VCID-251h-7yfd-sbdy |
| vulnerability_id |
VCID-251h-7yfd-sbdy |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5835 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83449 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.8345 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83344 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83359 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83374 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83373 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83398 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83407 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83417 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83412 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01938 |
| scoring_system |
epss |
| scoring_elements |
0.83448 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5835 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5835
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-251h-7yfd-sbdy |
|
| 13 |
| url |
VCID-27hh-rxke-cfan |
| vulnerability_id |
VCID-27hh-rxke-cfan |
| summary |
wp-admin/plugins.php in WordPress before 3.3.2 allows remote authenticated site administrators to bypass intended access restrictions and deactivate network-wide plugins via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2402 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76065 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76101 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.7608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76113 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76127 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76151 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76125 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76169 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00932 |
| scoring_system |
epss |
| scoring_elements |
0.76152 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2402 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2402
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-27hh-rxke-cfan |
|
| 14 |
| url |
VCID-2amm-jjpz-xyhf |
| vulnerability_id |
VCID-2amm-jjpz-xyhf |
| summary |
wordpress: multiple XSS issues in invite action |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1304 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86706 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86736 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86735 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86754 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86763 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86776 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86773 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86768 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86783 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86788 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0308 |
| scoring_system |
epss |
| scoring_elements |
0.86785 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1304 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1304
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2amm-jjpz-xyhf |
|
| 15 |
| url |
VCID-2b99-baqh-3ker |
| vulnerability_id |
VCID-2b99-baqh-3ker |
| summary |
Cross-site request forgery (CSRF) vulnerability in the customizer in WordPress before 3.4.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3384 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39362 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39523 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39461 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39516 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39532 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39505 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39488 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39539 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.3951 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39426 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3384 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3384
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2b99-baqh-3ker |
|
| 16 |
| url |
VCID-2gqt-ngbw-xyby |
| vulnerability_id |
VCID-2gqt-ngbw-xyby |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.87961 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.87975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.87979 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.87999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.88006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.88017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.88009 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.8801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.88024 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.03738 |
| scoring_system |
epss |
| scoring_elements |
0.88022 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21664 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21664
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2gqt-ngbw-xyby |
|
| 17 |
| url |
VCID-2h1g-qy4e-rkhb |
| vulnerability_id |
VCID-2h1g-qy4e-rkhb |
| summary |
Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Media security." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3122 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79151 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79157 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79168 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79193 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79225 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.7921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79202 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79228 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79226 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3122 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3122
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2h1g-qy4e-rkhb |
|
| 18 |
| url |
VCID-2hh2-akug-byew |
| vulnerability_id |
VCID-2hh2-akug-byew |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82217 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.8211 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.8214 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82166 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82184 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82178 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82216 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9039 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9039
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2hh2-akug-byew |
|
| 19 |
| url |
VCID-2jgs-b7r7-zygv |
| vulnerability_id |
VCID-2jgs-b7r7-zygv |
| summary |
In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77343 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.7735 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77377 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77357 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77397 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77439 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.77438 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01037 |
| scoring_system |
epss |
| scoring_elements |
0.7743 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11030
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2jgs-b7r7-zygv |
|
| 20 |
| url |
VCID-2jta-dshu-e7hb |
| vulnerability_id |
VCID-2jta-dshu-e7hb |
| summary |
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74301 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74332 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74353 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74374 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74354 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74391 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74384 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39202 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-39202
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2jta-dshu-e7hb |
|
| 21 |
| url |
VCID-2qnz-21s3-tbgm |
| vulnerability_id |
VCID-2qnz-21s3-tbgm |
| summary |
Wordpress contains several cross-site scripting, cross-site request forgery
and information leak vulnerabilities. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1049 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90839 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90855 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90865 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90877 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90891 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06232 |
| scoring_system |
epss |
| scoring_elements |
0.90916 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1049 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1049
|
| risk_score |
7.8 |
| exploitability |
2.0 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2qnz-21s3-tbgm |
|
| 22 |
| url |
VCID-2rqp-572a-ufcr |
| vulnerability_id |
VCID-2rqp-572a-ufcr |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3440 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93325 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93334 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.9334 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93353 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93357 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93355 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.10809 |
| scoring_system |
epss |
| scoring_elements |
0.93374 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.14391 |
| scoring_system |
epss |
| scoring_elements |
0.94441 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.14391 |
| scoring_system |
epss |
| scoring_elements |
0.94444 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3440 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3440
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rqp-572a-ufcr |
|
| 23 |
| url |
VCID-2s1y-35gq-vyh5 |
| vulnerability_id |
VCID-2s1y-35gq-vyh5 |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2200 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80424 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80339 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80366 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80384 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80394 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80412 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80397 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.8039 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80419 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01395 |
| scoring_system |
epss |
| scoring_elements |
0.80421 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2200 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2200
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2s1y-35gq-vyh5 |
|
| 24 |
| url |
VCID-2y62-terv-2qfc |
| vulnerability_id |
VCID-2y62-terv-2qfc |
| summary |
Multiple vulnerabilities have been found in Nagios, the worst of
which could lead to privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77963 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.7797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77878 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77913 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77895 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77922 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77952 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77936 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77935 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4796 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-4796
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2y62-terv-2qfc |
|
| 25 |
| url |
VCID-3131-uvkj-vbb5 |
| vulnerability_id |
VCID-3131-uvkj-vbb5 |
| summary |
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94826 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.9485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94854 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94858 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.9487 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.16371 |
| scoring_system |
epss |
| scoring_elements |
0.94874 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5695 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5695
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3131-uvkj-vbb5 |
|
| 26 |
| url |
VCID-3171-8hu9-4uev |
| vulnerability_id |
VCID-3171-8hu9-4uev |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76014 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76029 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.7593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75933 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75966 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75978 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75992 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75994 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75987 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76027 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17675 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17675
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3171-8hu9-4uev |
|
| 27 |
| url |
VCID-32qc-zmsg-gfa4 |
| vulnerability_id |
VCID-32qc-zmsg-gfa4 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5730 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92866 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92831 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92834 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92832 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92841 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92845 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.9285 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.9286 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92861 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5730 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5730
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-32qc-zmsg-gfa4 |
|
| 28 |
| url |
VCID-3572-tc84-pyhv |
| vulnerability_id |
VCID-3572-tc84-pyhv |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.77479 |
| scoring_system |
epss |
| scoring_elements |
0.98989 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.77479 |
| scoring_system |
epss |
| scoring_elements |
0.98988 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.77479 |
| scoring_system |
epss |
| scoring_elements |
0.98987 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.99074 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.99078 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.9908 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.99081 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.99082 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.79453 |
| scoring_system |
epss |
| scoring_elements |
0.99083 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2745 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2745
|
| risk_score |
9.8 |
| exploitability |
2.0 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3572-tc84-pyhv |
|
| 29 |
| url |
VCID-3cqk-swz6-dqez |
| vulnerability_id |
VCID-3cqk-swz6-dqez |
| summary |
WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2110 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79162 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79088 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79095 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79121 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79131 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79164 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79149 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79166 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01227 |
| scoring_system |
epss |
| scoring_elements |
0.79163 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2110 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2110
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3cqk-swz6-dqez |
|
| 30 |
| url |
VCID-3e65-zd17-rqhy |
| vulnerability_id |
VCID-3e65-zd17-rqhy |
| summary |
Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88186 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88194 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.8821 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88215 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88241 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88252 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88259 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0388 |
| scoring_system |
epss |
| scoring_elements |
0.88257 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4894 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4894
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3e65-zd17-rqhy |
|
| 31 |
| url |
VCID-3f5q-3k4x-aue9 |
| vulnerability_id |
VCID-3f5q-3k4x-aue9 |
| summary |
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1001000 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99058 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99057 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99045 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.9905 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99054 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99055 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.78934 |
| scoring_system |
epss |
| scoring_elements |
0.99056 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1001000 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1001000
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3f5q-3k4x-aue9 |
|
| 32 |
| url |
VCID-3m3b-wxjf-qfg4 |
| vulnerability_id |
VCID-3m3b-wxjf-qfg4 |
| summary |
Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74209 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74214 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74261 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74263 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74294 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74303 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4671 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-4671
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3m3b-wxjf-qfg4 |
|
| 33 |
| url |
VCID-3veg-k8v2-tyhr |
| vulnerability_id |
VCID-3veg-k8v2-tyhr |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98547 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98529 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98534 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98535 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98538 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.9854 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.66708 |
| scoring_system |
epss |
| scoring_elements |
0.98541 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17671 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17671
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3veg-k8v2-tyhr |
|
| 34 |
| url |
VCID-46dk-a282-8bf9 |
| vulnerability_id |
VCID-46dk-a282-8bf9 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5612 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81224 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81232 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81256 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81254 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81282 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81287 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81308 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81324 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81326 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5612 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5612
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-46dk-a282-8bf9 |
|
| 35 |
| url |
VCID-47fm-x1rg-vbct |
| vulnerability_id |
VCID-47fm-x1rg-vbct |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75932 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75946 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75851 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75908 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75931 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00916 |
| scoring_system |
epss |
| scoring_elements |
0.75905 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31210 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31210
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-47fm-x1rg-vbct |
|
| 36 |
| url |
VCID-47he-853j-8qdn |
| vulnerability_id |
VCID-47he-853j-8qdn |
| summary |
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39200 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82672 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82563 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82578 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82593 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82589 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82615 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82623 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82641 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82631 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01767 |
| scoring_system |
epss |
| scoring_elements |
0.82669 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39200 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-39200
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-47he-853j-8qdn |
|
| 37 |
| url |
VCID-4cs6-n1vc-13cd |
| vulnerability_id |
VCID-4cs6-n1vc-13cd |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2336 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84671 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84706 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.8473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84737 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84768 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2336 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2336
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4cs6-n1vc-13cd |
|
| 38 |
| url |
VCID-4eng-dut7-nqhw |
| vulnerability_id |
VCID-4eng-dut7-nqhw |
| summary |
WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0262 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76578 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76486 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.7649 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76534 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76545 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76571 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76551 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.7659 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0262 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0262
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4eng-dut7-nqhw |
|
| 39 |
| url |
VCID-4f6a-j9gu-k7f8 |
| vulnerability_id |
VCID-4f6a-j9gu-k7f8 |
| summary |
Unspecified vulnerability in akismet.php in Matt Mullenweg Akismet before 2.0.2, a WordPress plugin, has unknown impact and attack vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2714 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94574 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94516 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94523 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94531 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94543 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94548 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.9455 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94553 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94552 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.94565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.14939 |
| scoring_system |
epss |
| scoring_elements |
0.9457 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2714 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-2714
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4f6a-j9gu-k7f8 |
|
| 40 |
| url |
VCID-4g2n-5v12-yuff |
| vulnerability_id |
VCID-4g2n-5v12-yuff |
| summary |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31111 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62759 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62763 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62753 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.6277 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62778 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62681 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62714 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62677 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62729 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00433 |
| scoring_system |
epss |
| scoring_elements |
0.62746 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31111 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31111
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4g2n-5v12-yuff |
|
| 41 |
| url |
VCID-4gpe-jspv-n7c7 |
| vulnerability_id |
VCID-4gpe-jspv-n7c7 |
| summary |
Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0194 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69013 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.6903 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69031 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69081 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69124 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69109 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69079 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69119 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69128 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69108 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0194 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0194
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4gpe-jspv-n7c7 |
|
| 42 |
| url |
VCID-4h3z-2ypq-tyf1 |
| vulnerability_id |
VCID-4h3z-2ypq-tyf1 |
| summary |
Directory traversal vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to read or include arbitrary files via a trailing null byte (%00) in the (1) theme, (2) language, (3) plugins, or (4) lang parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4600 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95153 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95105 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95117 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95119 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95126 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.9513 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95136 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95138 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95141 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95149 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.17865 |
| scoring_system |
epss |
| scoring_elements |
0.95152 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4600 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-4600
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4h3z-2ypq-tyf1 |
|
| 43 |
| url |
VCID-4h9a-f492-cqgx |
| vulnerability_id |
VCID-4h9a-f492-cqgx |
| summary |
wp-admin/plugins.php in WordPress before 3.4.2, when the multisite feature is enabled, does not check for network-administrator privileges before performing a network-wide activation of an installed plugin, which might allow remote authenticated users to make unintended plugin changes by leveraging the Administrator role. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4422 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47319 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47256 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47312 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.4726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47314 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47311 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47336 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.4731 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47317 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47375 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47369 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4422 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4422
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4h9a-f492-cqgx |
|
| 44 |
| url |
VCID-4p1q-h56b-1qhj |
| vulnerability_id |
VCID-4p1q-h56b-1qhj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3438 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81677 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81688 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.8171 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81734 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81739 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81758 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81745 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81778 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01607 |
| scoring_system |
epss |
| scoring_elements |
0.81781 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3438 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3438
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4p1q-h56b-1qhj |
|
| 45 |
| url |
VCID-4sv3-qgzg-eyhn |
| vulnerability_id |
VCID-4sv3-qgzg-eyhn |
| summary |
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85602 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85506 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.8554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.8556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.8557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85585 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85577 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02585 |
| scoring_system |
epss |
| scoring_elements |
0.85605 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1897 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1897
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4sv3-qgzg-eyhn |
|
| 46 |
| url |
VCID-4ty5-fp9a-8qhg |
| vulnerability_id |
VCID-4ty5-fp9a-8qhg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87548 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87567 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87574 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87585 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87581 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87577 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87592 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87593 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03486 |
| scoring_system |
epss |
| scoring_elements |
0.87591 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16781 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16781
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty5-fp9a-8qhg |
|
| 47 |
| url |
VCID-532z-9qbb-dyfw |
| vulnerability_id |
VCID-532z-9qbb-dyfw |
| summary |
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58246 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11038 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11054 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11022 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10869 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1092 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10997 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1105 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1197 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58246 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58246
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-532z-9qbb-dyfw |
|
| 48 |
| url |
VCID-5698-c229-bqc9 |
| vulnerability_id |
VCID-5698-c229-bqc9 |
| summary |
WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17670 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90278 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90282 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90221 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90223 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90236 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90256 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90271 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.9027 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90265 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0554 |
| scoring_system |
epss |
| scoring_elements |
0.90281 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17670 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17670
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5698-c229-bqc9 |
|
| 49 |
| url |
VCID-56a2-3fcw-bkfg |
| vulnerability_id |
VCID-56a2-3fcw-bkfg |
| summary |
A flaw in WordPress allows registered WordPress users to elevate
privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3389 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78832 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78882 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78905 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78889 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.7888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78909 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78906 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78903 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3389 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-3389
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56a2-3fcw-bkfg |
|
| 50 |
| url |
VCID-5brn-syjs-d3dp |
| vulnerability_id |
VCID-5brn-syjs-d3dp |
| summary |
Moodle vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php), as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities. |
| references |
| 0 |
|
| 1 |
| reference_url |
http://moodle.org/security |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U |
|
| 1 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://moodle.org/security |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.4884 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48799 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48814 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48788 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48795 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48844 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48726 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48765 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1619 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-1619, GHSA-hhxf-w8hj-43w6
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5brn-syjs-d3dp |
|
| 51 |
| url |
VCID-5d4e-5ngu-mfgy |
| vulnerability_id |
VCID-5d4e-5ngu-mfgy |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The KSES text cleaning filter in lib/weblib.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60408 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60494 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60505 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60496 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60403 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60435 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60452 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00396 |
| scoring_system |
epss |
| scoring_elements |
0.60332 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2230 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2230, GHSA-3gm8-32vv-q8mp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5d4e-5ngu-mfgy |
|
| 52 |
| url |
VCID-5pv4-ff9z-r3hp |
| vulnerability_id |
VCID-5pv4-ff9z-r3hp |
| summary |
WordPress is vulnerable to SQL injection, information disclosure, and
cross-site scripting attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6808 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87587 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87519 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.8757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87581 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87574 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87588 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87589 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6808 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-6808
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pv4-ff9z-r3hp |
|
| 53 |
| url |
VCID-5q3r-v8z7-x3f8 |
| vulnerability_id |
VCID-5q3r-v8z7-x3f8 |
| summary |
The XML-RPC remote publishing interface in xmlrpc.php in WordPress before 3.0.3 does not properly check capabilities, which allows remote authenticated users to bypass intended access restrictions, and publish, edit, or delete posts, by leveraging the Author or Contributor role. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53464 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53488 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53513 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53481 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53531 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53527 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53576 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53577 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53583 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5106 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5106
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5q3r-v8z7-x3f8 |
|
| 54 |
| url |
VCID-5v95-fhhm-33an |
| vulnerability_id |
VCID-5v95-fhhm-33an |
| summary |
WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0682 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96177 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96185 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96193 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96196 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96206 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96209 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96215 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96227 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.25421 |
| scoring_system |
epss |
| scoring_elements |
0.96228 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0682 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0682
|
| risk_score |
0.4 |
| exploitability |
2.0 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5v95-fhhm-33an |
|
| 55 |
| url |
VCID-624m-hj1c-r3hq |
| vulnerability_id |
VCID-624m-hj1c-r3hq |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the popuptitle parameter to (1) wp-admin/post.php or (2) wp-admin/page-new.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84818 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84851 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84853 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84883 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.849 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84894 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84915 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02348 |
| scoring_system |
epss |
| scoring_elements |
0.84914 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0192 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0192
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-624m-hj1c-r3hq |
|
| 56 |
| url |
VCID-67jm-6jkk-1yaw |
| vulnerability_id |
VCID-67jm-6jkk-1yaw |
| summary |
Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1688 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70127 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70031 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70138 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70147 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70058 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70083 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70099 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70122 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70108 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00622 |
| scoring_system |
epss |
| scoring_elements |
0.70095 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1688 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-1688
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67jm-6jkk-1yaw |
|
| 57 |
| url |
VCID-6baf-6r3v-gub4 |
| vulnerability_id |
VCID-6baf-6r3v-gub4 |
| summary |
Wordpress contains several cross-site scripting, cross-site request forgery
and information leak vulnerabilities. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1409 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68883 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.689 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69551 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69602 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69618 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69626 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69651 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.6966 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69572 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1409 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1409
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6baf-6r3v-gub4 |
|
| 58 |
| url |
VCID-6cda-2819-puhp |
| vulnerability_id |
VCID-6cda-2819-puhp |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7168 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74107 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.7401 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74014 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74047 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74062 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74084 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74066 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74059 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74098 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7168 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7168
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cda-2819-puhp |
|
| 59 |
| url |
VCID-6d1g-aj3f-3kav |
| vulnerability_id |
VCID-6d1g-aj3f-3kav |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72269 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72275 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72294 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.7227 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72309 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72321 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72344 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72327 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72355 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72365 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72352 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5294 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5294
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6d1g-aj3f-3kav |
|
| 60 |
| url |
VCID-6ejh-nyh8-gqar |
| vulnerability_id |
VCID-6ejh-nyh8-gqar |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91124 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91132 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.9114 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91153 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91159 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91167 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91169 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91193 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.06599 |
| scoring_system |
epss |
| scoring_elements |
0.91196 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10100 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10100
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ejh-nyh8-gqar |
|
| 61 |
| url |
VCID-6j54-w242-hfce |
| vulnerability_id |
VCID-6j54-w242-hfce |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86256 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86245 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86258 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86263 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86189 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86202 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86222 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.02857 |
| scoring_system |
epss |
| scoring_elements |
0.86233 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43504 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://wordpress.org/download/ |
| reference_id |
download |
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:04:12Z/ |
|
|
| url |
https://wordpress.org/download/ |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43504
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6j54-w242-hfce |
|
| 62 |
| url |
VCID-6jxp-68cd-37db |
| vulnerability_id |
VCID-6jxp-68cd-37db |
| summary |
Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFupload 2.2.0.1 and earlier, as used in WordPress before 3.5.2, TinyMCE Image Manager 1.1 and earlier, and other products allows remote attackers to inject arbitrary web script or HTML via the buttonText parameter, a different vulnerability than CVE-2012-3414. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2399 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03082 |
| scoring_system |
epss |
| scoring_elements |
0.86711 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03082 |
| scoring_system |
epss |
| scoring_elements |
0.86722 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88804 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88821 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88838 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88847 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0427 |
| scoring_system |
epss |
| scoring_elements |
0.88842 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2399 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2399
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6jxp-68cd-37db |
|
| 63 |
| url |
VCID-6mkb-a89m-zfgs |
| vulnerability_id |
VCID-6mkb-a89m-zfgs |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4339 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.7534 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75343 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75375 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75397 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75407 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75427 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75435 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75441 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.7543 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4339 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4339
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6mkb-a89m-zfgs |
|
| 64 |
| url |
VCID-6npq-by6g-cqg8 |
| vulnerability_id |
VCID-6npq-by6g-cqg8 |
| summary |
WordPress before 2.2.2 allows remote attackers to redirect visitors to other websites and potentially obtain sensitive information via (1) the _wp_http_referer parameter to wp-pass.php, related to the wp_get_referer function in wp-includes/functions.php; and possibly other vectors related to (2) wp-includes/pluggable.php and (3) the wp_nonce_ays function in wp-includes/functions.php. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.7848 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78406 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78413 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78444 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78427 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78465 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78457 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01146 |
| scoring_system |
epss |
| scoring_elements |
0.78484 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3639 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3639
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6npq-by6g-cqg8 |
|
| 65 |
| url |
VCID-6rsq-xshv-bucw |
| vulnerability_id |
VCID-6rsq-xshv-bucw |
| summary |
Wordpress contains SQL injection and XSS vulnerabilities. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74694 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74604 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74635 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74609 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7464 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74654 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74677 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74657 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74649 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74686 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1687 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-1687
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6rsq-xshv-bucw |
|
| 66 |
| url |
VCID-6tqn-qmx9-f3dc |
| vulnerability_id |
VCID-6tqn-qmx9-f3dc |
| summary |
wordpress delayed attack via cookies |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5113 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53185 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53081 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53101 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53124 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53137 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53172 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53195 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53203 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5113 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5113
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6tqn-qmx9-f3dc |
|
| 67 |
| url |
VCID-6vg6-xewr-ryfv |
| vulnerability_id |
VCID-6vg6-xewr-ryfv |
| summary |
Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2612 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98806 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98787 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98794 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98797 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98799 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98803 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.73416 |
| scoring_system |
epss |
| scoring_elements |
0.98804 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2612 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2612
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6vg6-xewr-ryfv |
|
| 68 |
| url |
VCID-6xna-bhaz-bbcm |
| vulnerability_id |
VCID-6xna-bhaz-bbcm |
| summary |
WordPress 2.0.2 through 2.0.5 allows remote attackers to obtain sensitive information via a direct request for (1) 404.php, (2) akismet.php, (3) archive.php, (4) archives.php, (5) attachment.php, (6) blogger.php, (7) comments.php, (8) comments-popup.php, (9) dotclear.php, (10) footer.php, (11) functions.php, (12) header.php, (13) hello.php, (14) wp-content/themes/default/index.php, (15) links.php, (16) livejournal.php, (17) mt.php, (18) page.php, (19) rss.php, (20) searchform.php, (21) search.php, (22) sidebar.php, (23) single.php, (24) textpattern.php, (25) upgrade-functions.php, (26) upgrade-schema.php, or (27) wp-db-backup.php, which reveal the path in various error messages. NOTE: another researcher has disputed the details of this report, stating that version 2.0.5 does not exist. NOTE: the admin-footer.php, admin-functions.php, default-filters.php, edit-form-advanced.php, edit-link-form.php, edit-page-form.php, kses.php, locale.php, rss-functions.php, template-loader.php, and wp-db.php vectors are already covered by CVE-2006-0986. The edit-form-comment.php, vars.php, and wp-settings.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74925 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74928 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74931 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74977 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74999 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74978 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.74968 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.75005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.75012 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00856 |
| scoring_system |
epss |
| scoring_elements |
0.75002 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4743 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4743
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6xna-bhaz-bbcm |
|
| 69 |
| url |
VCID-722f-e2hf-xyc9 |
| vulnerability_id |
VCID-722f-e2hf-xyc9 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5561 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97941 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97943 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97946 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97951 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97953 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97956 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97958 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97959 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97965 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.53022 |
| scoring_system |
epss |
| scoring_elements |
0.97966 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5561 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5561
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-722f-e2hf-xyc9 |
|
| 70 |
| url |
VCID-7643-6738-v3g9 |
| vulnerability_id |
VCID-7643-6738-v3g9 |
| summary |
Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5710 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87245 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87271 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87268 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87299 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87318 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03339 |
| scoring_system |
epss |
| scoring_elements |
0.87312 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5710 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5710
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7643-6738-v3g9 |
|
| 71 |
| url |
VCID-767p-btpd-tudb |
| vulnerability_id |
VCID-767p-btpd-tudb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17669 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92321 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92322 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92274 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92281 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92287 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.9229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92301 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92305 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92311 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.92312 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.08377 |
| scoring_system |
epss |
| scoring_elements |
0.9231 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17669 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17669
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-767p-btpd-tudb |
|
| 72 |
| url |
VCID-7dmm-cvtk-aydj |
| vulnerability_id |
VCID-7dmm-cvtk-aydj |
| summary |
wp-admin/admin-functions.php in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a does not properly verify the unfiltered_html privilege, which allows remote attackers to conduct cross-site scripting (XSS) attacks via modified data to (1) post.php or (2) page.php with a no_filter field. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4893 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81327 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81357 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81386 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81391 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81413 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.814 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81393 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.8143 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01545 |
| scoring_system |
epss |
| scoring_elements |
0.81431 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4893 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4893
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7dmm-cvtk-aydj |
|
| 73 |
| url |
VCID-7fgf-juyy-fufk |
| vulnerability_id |
VCID-7fgf-juyy-fufk |
| summary |
Cross-site scripting (XSS) vulnerability in the CSRF protection scheme in WordPress before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via a CSRF attack with an invalid token and quote characters or HTML tags in URL variable names, which are not properly handled when WordPress generates a new link to verify the request. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84246 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84149 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84162 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.8418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84204 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.8421 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84222 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84219 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.8424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02143 |
| scoring_system |
epss |
| scoring_elements |
0.84241 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0106 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0106
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7fgf-juyy-fufk |
|
| 74 |
| url |
VCID-7gbk-16zv-j7f9 |
| vulnerability_id |
VCID-7gbk-16zv-j7f9 |
| summary |
WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-6412 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85112 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85125 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85142 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85145 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85175 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.8519 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85184 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85206 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-6412 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-6412
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbk-16zv-j7f9 |
|
| 75 |
| url |
VCID-7hgx-yyw8-23cj |
| vulnerability_id |
VCID-7hgx-yyw8-23cj |
| summary |
The oEmbed protocol implementation in WordPress before 4.5.3 allows remote attackers to cause a denial of service via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5836 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91643 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91651 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91586 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91594 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91621 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91627 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.9163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07246 |
| scoring_system |
epss |
| scoring_elements |
0.91633 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5836 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5836
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7hgx-yyw8-23cj |
|
| 76 |
| url |
VCID-7hh4-ex15-9uh9 |
| vulnerability_id |
VCID-7hh4-ex15-9uh9 |
| summary |
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3127 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49677 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49736 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49688 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49743 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49737 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49727 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49728 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49775 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00263 |
| scoring_system |
epss |
| scoring_elements |
0.49748 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3127 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3127
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7hh4-ex15-9uh9 |
|
| 77 |
| url |
VCID-7kjc-hwqu-wufc |
| vulnerability_id |
VCID-7kjc-hwqu-wufc |
| summary |
wp-login.php in WordPress allows remote attackers to redirect authenticated users to other websites and potentially obtain sensitive information via the redirect_to parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1599 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80261 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80316 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80334 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.8032 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80268 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80289 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80277 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01385 |
| scoring_system |
epss |
| scoring_elements |
0.80305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01438 |
| scoring_system |
epss |
| scoring_elements |
0.80744 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01438 |
| scoring_system |
epss |
| scoring_elements |
0.80746 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01438 |
| scoring_system |
epss |
| scoring_elements |
0.80743 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1599 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1599
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7kjc-hwqu-wufc |
|
| 78 |
| url |
VCID-7qy9-e4j5-6fdb |
| vulnerability_id |
VCID-7qy9-e4j5-6fdb |
| summary |
wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0233 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93458 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93466 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93473 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93474 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93481 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93485 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.9349 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.9351 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.11179 |
| scoring_system |
epss |
| scoring_elements |
0.93516 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0233 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0233
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7qy9-e4j5-6fdb |
|
| 79 |
| url |
VCID-7twj-axjh-rudj |
| vulnerability_id |
VCID-7twj-axjh-rudj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.9121 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91132 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91146 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91154 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91173 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91181 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.06615 |
| scoring_system |
epss |
| scoring_elements |
0.91183 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17094 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17094
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7twj-axjh-rudj |
|
| 80 |
| url |
VCID-7wx9-apzc-qqar |
| vulnerability_id |
VCID-7wx9-apzc-qqar |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93825 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93844 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93847 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93859 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93864 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93892 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93893 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2334
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wx9-apzc-qqar |
|
| 81 |
| url |
VCID-82ky-v2zx-53h4 |
| vulnerability_id |
VCID-82ky-v2zx-53h4 |
| summary |
WordPress before 2.0.5 does not properly store a profile containing a string representation of a serialized object, which allows remote authenticated users to cause a denial of service (application crash) via a string that represents a (1) malformed or (2) large serialized object, because the object triggers automatic unserialization for display. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.8611 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86179 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.861 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.8617 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86165 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86182 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86187 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86125 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.02824 |
| scoring_system |
epss |
| scoring_elements |
0.86145 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-6017 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-6017
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-82ky-v2zx-53h4 |
|
| 82 |
| url |
VCID-8hdt-8gc7-4kgg |
| vulnerability_id |
VCID-8hdt-8gc7-4kgg |
| summary |
wp-admin/media-upload.php in WordPress before 3.3.3 allows remote attackers to obtain sensitive information or bypass intended media-attachment restrictions via a post_id value. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6634 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.7412 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74123 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74156 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74174 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00807 |
| scoring_system |
epss |
| scoring_elements |
0.74206 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6634 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6634
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8hdt-8gc7-4kgg |
|
| 83 |
| url |
VCID-8kvg-dxb5-7uhx |
| vulnerability_id |
VCID-8kvg-dxb5-7uhx |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3439 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.8679 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86801 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.8682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86813 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86833 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86855 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86851 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86863 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86868 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03125 |
| scoring_system |
epss |
| scoring_elements |
0.86869 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3439 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3439
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvg-dxb5-7uhx |
|
| 84 |
| url |
VCID-8mat-2mjd-7fgm |
| vulnerability_id |
VCID-8mat-2mjd-7fgm |
| summary |
WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9787 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99157 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99155 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99146 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.9915 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.81017 |
| scoring_system |
epss |
| scoring_elements |
0.99154 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-9787 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-9787
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8mat-2mjd-7fgm |
|
| 85 |
| url |
VCID-8ms9-r5pz-fkc3 |
| vulnerability_id |
VCID-8ms9-r5pz-fkc3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5265 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91499 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.9143 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91436 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91454 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91473 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91479 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91503 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07017 |
| scoring_system |
epss |
| scoring_elements |
0.91498 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5265 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5265
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ms9-r5pz-fkc3 |
|
| 86 |
| url |
VCID-8n5j-65xk-wqbp |
| vulnerability_id |
VCID-8n5j-65xk-wqbp |
| summary |
Wordpress before 2.8.3 does not check capabilities for certain actions, which allows remote attackers to make unauthorized edits or additions via a direct request to (1) edit-comments.php, (2) edit-pages.php, (3) edit.php, (4) edit-category-form.php, (5) edit-link-category-form.php, (6) edit-tag-form.php, (7) export.php, (8) import.php, or (9) link-add.php in wp-admin/. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80499 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80517 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80547 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80561 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80581 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80583 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80586 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2854 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2854
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8n5j-65xk-wqbp |
|
| 87 |
| url |
VCID-8rfd-k93s-qycc |
| vulnerability_id |
VCID-8rfd-k93s-qycc |
| summary |
Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14724 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91918 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91866 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91881 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91888 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.919 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91909 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91905 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.07679 |
| scoring_system |
epss |
| scoring_elements |
0.91924 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14724 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14724
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8rfd-k93s-qycc |
|
| 88 |
| url |
VCID-8sa8-xkg1-ybbm |
| vulnerability_id |
VCID-8sa8-xkg1-ybbm |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66172 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66212 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66209 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66257 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.6627 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.6629 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66277 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66246 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.6628 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66296 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4153 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4153
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8sa8-xkg1-ybbm |
|
| 89 |
| url |
VCID-9166-twpv-u3a9 |
| vulnerability_id |
VCID-9166-twpv-u3a9 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20150 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91679 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91687 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91693 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91721 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91726 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91722 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91743 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91735 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.07368 |
| scoring_system |
epss |
| scoring_elements |
0.91737 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20150 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20150
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9166-twpv-u3a9 |
|
| 90 |
| url |
VCID-91ay-j618-akgj |
| vulnerability_id |
VCID-91ay-j618-akgj |
| summary |
SQL injection vulnerability in xmlrpc.php in WordPress 2.2 allows remote authenticated users to execute arbitrary SQL commands via a parameter value in an XML RPC wp.suggestCategories methodCall, a different vector than CVE-2007-1897. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85571 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85475 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85504 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85508 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85528 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85537 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.8555 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.8557 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02571 |
| scoring_system |
epss |
| scoring_elements |
0.85575 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3140 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3140
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-91ay-j618-akgj |
|
| 91 |
| url |
VCID-92fa-nrxb-e3gj |
| vulnerability_id |
VCID-92fa-nrxb-e3gj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28032 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96272 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96221 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96229 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96236 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.9624 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96249 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96256 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96257 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.25814 |
| scoring_system |
epss |
| scoring_elements |
0.96271 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28032 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28032
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92fa-nrxb-e3gj |
|
| 92 |
| url |
VCID-95zd-g97m-ekh3 |
| vulnerability_id |
VCID-95zd-g97m-ekh3 |
| summary |
getID3 is vulnerable to XML External Entity (XXE)
getID3() before 1.9.9, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83546 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83497 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.8347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83483 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.8354 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03481 |
| scoring_system |
epss |
| scoring_elements |
0.87584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.03481 |
| scoring_system |
epss |
| scoring_elements |
0.87571 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03481 |
| scoring_system |
epss |
| scoring_elements |
0.87585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03481 |
| scoring_system |
epss |
| scoring_elements |
0.87586 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2053 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2053, GHSA-5v43-55m5-qr8f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-95zd-g97m-ekh3 |
|
| 93 |
| url |
VCID-96pa-cg28-cbgy |
| vulnerability_id |
VCID-96pa-cg28-cbgy |
| summary |
Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3233 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64611 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64498 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64551 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.6458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64538 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64586 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.6462 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64607 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64614 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64626 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3233 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3233
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-96pa-cg28-cbgy |
|
| 94 |
| url |
VCID-98e3-ffna-jfbs |
| vulnerability_id |
VCID-98e3-ffna-jfbs |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85316 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85319 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85226 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85238 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85257 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85259 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85289 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85303 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85302 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85298 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02484 |
| scoring_system |
epss |
| scoring_elements |
0.85318 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17674 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17674
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-98e3-ffna-jfbs |
|
| 95 |
| url |
VCID-9dcr-4f3a-myfs |
| vulnerability_id |
VCID-9dcr-4f3a-myfs |
| summary |
wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5296 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.6082 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60921 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60935 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60951 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60972 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60958 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.6094 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60982 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60987 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5296 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5296
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9dcr-4f3a-myfs |
|
| 96 |
| url |
VCID-9t3e-tq9t-7qay |
| vulnerability_id |
VCID-9t3e-tq9t-7qay |
| summary |
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.7656 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76565 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76575 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76607 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76618 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76645 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76624 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76615 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76656 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.7666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00969 |
| scoring_system |
epss |
| scoring_elements |
0.76648 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3126 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3126
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9t3e-tq9t-7qay |
|
| 97 |
| url |
VCID-9zbn-b1sp-buan |
| vulnerability_id |
VCID-9zbn-b1sp-buan |
| summary |
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78034 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78042 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78072 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.7808 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78111 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78094 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78091 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78126 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78125 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78118 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3128 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3128
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9zbn-b1sp-buan |
|
| 98 |
| url |
VCID-aesj-sy6k-57de |
| vulnerability_id |
VCID-aesj-sy6k-57de |
| summary |
Cross-site scripting (XSS) vulnerability in the column_title function in wp-admin/includes/class-wp-media-list-table.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5834. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5833 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79093 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79096 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79019 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79025 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79036 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.7906 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79068 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79092 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79078 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5833 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5833
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aesj-sy6k-57de |
|
| 99 |
| url |
VCID-agpu-husf-6be4 |
| vulnerability_id |
VCID-agpu-husf-6be4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85576 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.8558 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85481 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.8551 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85534 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85543 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85557 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85555 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02575 |
| scoring_system |
epss |
| scoring_elements |
0.85574 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16217 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16217
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-agpu-husf-6be4 |
|
| 100 |
| url |
VCID-ajbz-j6qz-vua9 |
| vulnerability_id |
VCID-ajbz-j6qz-vua9 |
| summary |
Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) edit-link-category-form.php, (6) edit-link-form.php, (7) edit-page-form.php, and (8) edit-tag-form.php in wp-admin/. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78843 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.7889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78914 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2853 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2853
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajbz-j6qz-vua9 |
|
| 101 |
| url |
VCID-ajrt-bhrw-k7an |
| vulnerability_id |
VCID-ajrt-bhrw-k7an |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74432 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74442 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.7435 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74354 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74381 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74403 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74433 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16220 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16220
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrt-bhrw-k7an |
|
| 102 |
| url |
VCID-aqrt-q5ck-p3gz |
| vulnerability_id |
VCID-aqrt-q5ck-p3gz |
| summary |
Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47806 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47815 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47867 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47863 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47887 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47864 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47874 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47927 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47922 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47875 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0196 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0196
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aqrt-q5ck-p3gz |
|
| 103 |
| url |
VCID-ar2m-eryr-hba4 |
| vulnerability_id |
VCID-ar2m-eryr-hba4 |
| summary |
WordPress before 1.5.2 allows remote attackers to obtain sensitive information via a direct request to (1) wp-includes/vars.php, (2) wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4) wp-admin/edit-form.php, (5) wp-settings.php, and (6) wp-admin/edit-form-comment.php, which leaks the path in an error message related to undefined functions or failed includes. NOTE: the wp-admin/menu-header.php vector is already covered by CVE-2005-2110. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors were also reported to affect WordPress 2.0.1. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4463 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81622 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81514 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81526 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81547 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81579 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81599 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.8158 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81617 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01582 |
| scoring_system |
epss |
| scoring_elements |
0.81618 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4463 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-4463
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ar2m-eryr-hba4 |
|
| 104 |
| url |
VCID-aup2-49ee-jkdf |
| vulnerability_id |
VCID-aup2-49ee-jkdf |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.85003 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.85006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84906 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84939 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84967 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84974 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84989 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84988 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.84984 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02377 |
| scoring_system |
epss |
| scoring_elements |
0.85004 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16222 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16222
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aup2-49ee-jkdf |
|
| 105 |
| url |
VCID-azsx-2ydf-zyag |
| vulnerability_id |
VCID-azsx-2ydf-zyag |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4050 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85038 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85094 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85117 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85114 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85133 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85135 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02416 |
| scoring_system |
epss |
| scoring_elements |
0.85132 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4050 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4050
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-azsx-2ydf-zyag |
|
| 106 |
| url |
VCID-azyj-28v6-ufhg |
| vulnerability_id |
VCID-azyj-28v6-ufhg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65694 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65743 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65773 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65738 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65778 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65826 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65813 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39201 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-39201
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-azyj-28v6-ufhg |
|
| 107 |
| url |
VCID-b4h4-1gys-uqcc |
| vulnerability_id |
VCID-b4h4-1gys-uqcc |
| summary |
wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72855 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72909 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72952 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72962 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72955 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-6767
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4h4-1gys-uqcc |
|
| 108 |
| url |
VCID-b8ex-3tnw-yuh8 |
| vulnerability_id |
VCID-b8ex-3tnw-yuh8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10102 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89859 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89862 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89875 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89881 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89897 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89902 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89909 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.89916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.05168 |
| scoring_system |
epss |
| scoring_elements |
0.8991 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10102 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10102
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ex-3tnw-yuh8 |
|
| 109 |
| url |
VCID-ba3v-4d8e-mfgx |
| vulnerability_id |
VCID-ba3v-4d8e-mfgx |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1502 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77941 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77942 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77905 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77935 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77853 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77894 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.7788 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1502 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1502, GHSA-v759-3wr5-p294
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3v-4d8e-mfgx |
|
| 110 |
| url |
VCID-bb3n-jh6p-vfhm |
| vulnerability_id |
VCID-bb3n-jh6p-vfhm |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90526 |
| scoring_system |
epss |
| scoring_elements |
0.99614 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.90904 |
| scoring_system |
epss |
| scoring_elements |
0.9963 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.90904 |
| scoring_system |
epss |
| scoring_elements |
0.99629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.90904 |
| scoring_system |
epss |
| scoring_elements |
0.99633 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.90904 |
| scoring_system |
epss |
| scoring_elements |
0.99632 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.90904 |
| scoring_system |
epss |
| scoring_elements |
0.99631 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21661 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21661
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3n-jh6p-vfhm |
|
| 111 |
| url |
VCID-bj42-unmz-w3ht |
| vulnerability_id |
VCID-bj42-unmz-w3ht |
| summary |
Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6633 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60081 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60159 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60184 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60203 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60217 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60225 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60207 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60247 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60254 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60241 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6633 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6633
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bj42-unmz-w3ht |
|
| 112 |
| url |
VCID-bjrn-fyux-wyh3 |
| vulnerability_id |
VCID-bjrn-fyux-wyh3 |
| summary |
wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2109 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77838 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.7775 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77756 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77783 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77767 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77794 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.778 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.7781 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77809 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77845 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01077 |
| scoring_system |
epss |
| scoring_elements |
0.77844 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2109 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2109
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bjrn-fyux-wyh3 |
|
| 113 |
| url |
VCID-bubm-v7mg-xkcg |
| vulnerability_id |
VCID-bubm-v7mg-xkcg |
| summary |
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79124 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79131 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79156 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79142 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79166 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79174 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79198 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.792 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01232 |
| scoring_system |
epss |
| scoring_elements |
0.79197 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39203 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-39203
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bubm-v7mg-xkcg |
|
| 114 |
| url |
VCID-buuf-pyc5-ybcg |
| vulnerability_id |
VCID-buuf-pyc5-ybcg |
| summary |
wp-includes/class-wp-customize-widgets.php in the widget implementation in WordPress 3.9.x before 3.9.2 might allow remote attackers to execute arbitrary code via crafted serialized data. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91425 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91352 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91358 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91368 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91375 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91394 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91401 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91428 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.06913 |
| scoring_system |
epss |
| scoring_elements |
0.91424 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5203
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-buuf-pyc5-ybcg |
|
| 115 |
| url |
VCID-c2ta-7w7f-kbed |
| vulnerability_id |
VCID-c2ta-7w7f-kbed |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85222 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85141 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8519 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85205 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85202 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85199 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16218 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16218
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2ta-7w7f-kbed |
|
| 116 |
| url |
VCID-c62s-z1vc-nubq |
| vulnerability_id |
VCID-c62s-z1vc-nubq |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14720 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85756 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85671 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85737 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85751 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14720 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14720
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c62s-z1vc-nubq |
|
| 117 |
| url |
VCID-c7ej-2svr-uyd3 |
| vulnerability_id |
VCID-c7ej-2svr-uyd3 |
| summary |
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-4439 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90817 |
| scoring_system |
epss |
| scoring_elements |
0.99629 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.90817 |
| scoring_system |
epss |
| scoring_elements |
0.99632 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.91499 |
| scoring_system |
epss |
| scoring_elements |
0.99671 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.91499 |
| scoring_system |
epss |
| scoring_elements |
0.99668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.91499 |
| scoring_system |
epss |
| scoring_elements |
0.99669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.91499 |
| scoring_system |
epss |
| scoring_elements |
0.9967 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.91805 |
| scoring_system |
epss |
| scoring_elements |
0.99685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.91805 |
| scoring_system |
epss |
| scoring_elements |
0.99686 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-4439 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-4439
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c7ej-2svr-uyd3 |
|
| 118 |
| url |
VCID-c9m4-z6x3-8ubj |
| vulnerability_id |
VCID-c9m4-z6x3-8ubj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8834 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73151 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73053 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73063 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73083 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73057 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73094 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73107 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73132 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73112 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73149 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8834 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8834
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c9m4-z6x3-8ubj |
|
| 119 |
| url |
VCID-cce4-nh1p-f3gn |
| vulnerability_id |
VCID-cce4-nh1p-f3gn |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8942 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92957 |
| scoring_system |
epss |
| scoring_elements |
0.99776 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.93005 |
| scoring_system |
epss |
| scoring_elements |
0.99784 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.93005 |
| scoring_system |
epss |
| scoring_elements |
0.99781 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.93005 |
| scoring_system |
epss |
| scoring_elements |
0.99782 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.93005 |
| scoring_system |
epss |
| scoring_elements |
0.99783 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8942 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8942
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cce4-nh1p-f3gn |
|
| 120 |
| url |
VCID-cdew-g3ut-vucc |
| vulnerability_id |
VCID-cdew-g3ut-vucc |
| summary |
wordpress: insufficient SSL communication enforcement |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3747 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80735 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80638 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80668 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80663 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80691 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80701 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80718 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80704 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80696 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01436 |
| scoring_system |
epss |
| scoring_elements |
0.80731 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-3747 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-3747
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdew-g3ut-vucc |
|
| 121 |
| url |
VCID-cdj6-mgne-bkcs |
| vulnerability_id |
VCID-cdj6-mgne-bkcs |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6634 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73676 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73709 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73681 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73716 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73729 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73751 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73733 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73724 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00782 |
| scoring_system |
epss |
| scoring_elements |
0.73775 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6634 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6634
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdj6-mgne-bkcs |
|
| 122 |
| url |
VCID-cg91-ww8b-jfep |
| vulnerability_id |
VCID-cg91-ww8b-jfep |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5738 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72301 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72326 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72303 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72341 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72353 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72376 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.7236 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72347 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72389 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00715 |
| scoring_system |
epss |
| scoring_elements |
0.72385 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5738 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-5738
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg91-ww8b-jfep |
|
| 123 |
| url |
VCID-cjc2-1tw5-u7aj |
| vulnerability_id |
VCID-cjc2-1tw5-u7aj |
| summary |
wordpress: security fixes in upstream version 2.5.1 (CVE-2008-1930, CVE-2008-2068) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71331 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71356 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.7133 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71371 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71384 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71407 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71392 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71374 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.7142 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71426 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71405 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2068 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-2068
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cjc2-1tw5-u7aj |
|
| 124 |
| url |
VCID-cnz9-cwwa-23d1 |
| vulnerability_id |
VCID-cnz9-cwwa-23d1 |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2107 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75794 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75798 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.7583 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75808 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75841 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75858 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75851 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75888 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00912 |
| scoring_system |
epss |
| scoring_elements |
0.75892 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2107 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2107
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cnz9-cwwa-23d1 |
|
| 125 |
| url |
VCID-cut3-n4rz-jqf7 |
| vulnerability_id |
VCID-cut3-n4rz-jqf7 |
| summary |
SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4154 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74534 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74538 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74565 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74539 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74587 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.7461 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.7459 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74619 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74626 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74617 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4154 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4154
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cut3-n4rz-jqf7 |
|
| 126 |
| url |
VCID-cuw7-7fmc-xbc1 |
| vulnerability_id |
VCID-cuw7-7fmc-xbc1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5488 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75426 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75334 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.7537 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75349 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75393 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75403 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75401 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.7539 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75431 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75437 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5488 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5488
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cuw7-7fmc-xbc1 |
|
| 127 |
| url |
VCID-cwud-1n3k-rfcs |
| vulnerability_id |
VCID-cwud-1n3k-rfcs |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87189 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87253 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87247 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87257 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87199 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87216 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.87233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.03307 |
| scoring_system |
epss |
| scoring_elements |
0.8724 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.04064 |
| scoring_system |
epss |
| scoring_elements |
0.88541 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.04179 |
| scoring_system |
epss |
| scoring_elements |
0.88716 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17092 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17092
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cwud-1n3k-rfcs |
|
| 128 |
| url |
VCID-d4b9-ek6d-nbb3 |
| vulnerability_id |
VCID-d4b9-ek6d-nbb3 |
| summary |
The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1930 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07663 |
| scoring_system |
epss |
| scoring_elements |
0.91858 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07663 |
| scoring_system |
epss |
| scoring_elements |
0.91866 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07663 |
| scoring_system |
epss |
| scoring_elements |
0.91873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92333 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92344 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92354 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92356 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.08455 |
| scoring_system |
epss |
| scoring_elements |
0.92365 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1930 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1930
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4b9-ek6d-nbb3 |
|
| 129 |
| url |
VCID-d6e4-71uw-xyeb |
| vulnerability_id |
VCID-d6e4-71uw-xyeb |
| summary |
The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63538 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63624 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63584 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63635 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63652 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63666 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63651 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63655 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63664 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0045 |
| scoring_system |
epss |
| scoring_elements |
0.63648 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10148 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-10148
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d6e4-71uw-xyeb |
|
| 130 |
| url |
VCID-dfrf-wx3v-rfbg |
| vulnerability_id |
VCID-dfrf-wx3v-rfbg |
| summary |
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3543 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.8017 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80224 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80243 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80228 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01371 |
| scoring_system |
epss |
| scoring_elements |
0.80187 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01689 |
| scoring_system |
epss |
| scoring_elements |
0.82259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01689 |
| scoring_system |
epss |
| scoring_elements |
0.82222 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01689 |
| scoring_system |
epss |
| scoring_elements |
0.82258 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3543 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3543
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dfrf-wx3v-rfbg |
|
| 131 |
| url |
VCID-dg97-fkvm-rqh2 |
| vulnerability_id |
VCID-dg97-fkvm-rqh2 |
| summary |
SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4257 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87237 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.8717 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.8718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87194 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87228 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87224 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87239 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03296 |
| scoring_system |
epss |
| scoring_elements |
0.87244 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4257 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-4257
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dg97-fkvm-rqh2 |
|
| 132 |
| url |
VCID-dkht-9n6n-fucn |
| vulnerability_id |
VCID-dkht-9n6n-fucn |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.8687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86924 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.8694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86944 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.8688 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86899 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86893 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86913 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86921 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.86934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.03163 |
| scoring_system |
epss |
| scoring_elements |
0.8693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.04176 |
| scoring_system |
epss |
| scoring_elements |
0.88709 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14725 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14725
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dkht-9n6n-fucn |
|
| 133 |
| url |
VCID-dv3a-7kct-xqh6 |
| vulnerability_id |
VCID-dv3a-7kct-xqh6 |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32111 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61112 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.6108 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61122 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61128 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61033 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61062 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61028 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61076 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61092 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61113 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32111 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32111
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dv3a-7kct-xqh6 |
|
| 134 |
| url |
VCID-dw8d-4vse-jqbe |
| vulnerability_id |
VCID-dw8d-4vse-jqbe |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87441 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.8745 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87464 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87466 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87502 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.87495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03446 |
| scoring_system |
epss |
| scoring_elements |
0.8751 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5734 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5734
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dw8d-4vse-jqbe |
|
| 135 |
| url |
VCID-dzgs-vwe3-fub1 |
| vulnerability_id |
VCID-dzgs-vwe3-fub1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20042 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.8973 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89748 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.8978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89778 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89787 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0505 |
| scoring_system |
epss |
| scoring_elements |
0.89781 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20042 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20042
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzgs-vwe3-fub1 |
|
| 136 |
| url |
VCID-e1ss-azne-d7ha |
| vulnerability_id |
VCID-e1ss-azne-d7ha |
| summary |
In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94215 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94153 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94163 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94176 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94186 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.9419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.94195 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.13419 |
| scoring_system |
epss |
| scoring_elements |
0.9421 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6819 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6819
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ss-azne-d7ha |
|
| 137 |
| url |
VCID-e1ud-yfqb-4kca |
| vulnerability_id |
VCID-e1ud-yfqb-4kca |
| summary |
The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42529 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42568 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.4262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42654 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42649 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42634 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4421 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4421
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ud-yfqb-4kca |
|
| 138 |
| url |
VCID-e37d-h1k6-sud6 |
| vulnerability_id |
VCID-e37d-h1k6-sud6 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14721 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85756 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85671 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85737 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02645 |
| scoring_system |
epss |
| scoring_elements |
0.85751 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14721 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14721
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e37d-h1k6-sud6 |
|
| 139 |
| url |
VCID-e8s1-sduw-a7aa |
| vulnerability_id |
VCID-e8s1-sduw-a7aa |
| summary |
several |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82201 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82105 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82149 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82167 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01677 |
| scoring_system |
epss |
| scoring_elements |
0.82199 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2173 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2173
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e8s1-sduw-a7aa |
|
| 140 |
| url |
VCID-ejtq-a5ca-ffbu |
| vulnerability_id |
VCID-ejtq-a5ca-ffbu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85222 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85141 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.8519 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85205 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85202 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02449 |
| scoring_system |
epss |
| scoring_elements |
0.85199 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16221 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16221
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ejtq-a5ca-ffbu |
|
| 141 |
| url |
VCID-ewvz-wnn2-57h2 |
| vulnerability_id |
VCID-ewvz-wnn2-57h2 |
| summary |
Multiple "unannounced" cross-site scripting (XSS) vulnerabilities in WordPress before 2.0.2 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.5687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56967 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56989 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56965 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57018 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57029 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57009 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56988 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1263 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1263
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ewvz-wnn2-57h2 |
|
| 142 |
| url |
VCID-f8cq-auvz-7be1 |
| vulnerability_id |
VCID-f8cq-auvz-7be1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5837 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74513 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74521 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74428 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74432 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74482 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74504 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74485 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74476 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00827 |
| scoring_system |
epss |
| scoring_elements |
0.74514 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5837 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5837
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f8cq-auvz-7be1 |
|
| 143 |
| url |
VCID-fa64-2upm-rfg5 |
| vulnerability_id |
VCID-fa64-2upm-rfg5 |
| summary |
Cross-site scripting (XSS) vulnerability in an mt import in wp-admin/admin.php in WordPress 2.1.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the demo parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: another researcher disputes this issue, stating that this is legitimate functionality for administrators. However, it has been patched by at least one vendor |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1732 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.6304 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63178 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63185 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63099 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63094 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63146 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63163 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63181 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00439 |
| scoring_system |
epss |
| scoring_elements |
0.63143 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63918 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1732 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1732
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fa64-2upm-rfg5 |
|
| 144 |
| url |
VCID-fc6e-njgb-pued |
| vulnerability_id |
VCID-fc6e-njgb-pued |
| summary |
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0541 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.7976 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79678 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79706 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79692 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.7972 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79733 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79727 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79756 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79757 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0541 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0541
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fc6e-njgb-pued |
|
| 145 |
| url |
VCID-fcqu-11yk-h3af |
| vulnerability_id |
VCID-fcqu-11yk-h3af |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20149 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.88984 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.88991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89033 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89045 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.8904 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89051 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89046 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20149 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20149
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fcqu-11yk-h3af |
|
| 146 |
| url |
VCID-fd51-1hat-v3ee |
| vulnerability_id |
VCID-fd51-1hat-v3ee |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17091 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89111 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89115 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89047 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89056 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89071 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89091 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89096 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89103 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.04478 |
| scoring_system |
epss |
| scoring_elements |
0.89101 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17091 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17091
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fd51-1hat-v3ee |
|
| 147 |
| url |
VCID-fdtx-uggj-ybby |
| vulnerability_id |
VCID-fdtx-uggj-ybby |
| summary |
The make_clickable function in wp-includes/formatting.php in WordPress before 3.1.1 does not properly check URLs before passing them to the PCRE library, which allows remote attackers to cause a denial of service (crash) via a comment with a crafted URL that triggers many recursive calls. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4957 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86051 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86062 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86097 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86108 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86122 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86117 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86134 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86139 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02802 |
| scoring_system |
epss |
| scoring_elements |
0.86132 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4957 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4957
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fdtx-uggj-ybby |
|
| 148 |
| url |
VCID-fkqw-vkvb-gydh |
| vulnerability_id |
VCID-fkqw-vkvb-gydh |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5832 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85631 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85634 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85534 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85564 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85569 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85589 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.856 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85614 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85607 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.02598 |
| scoring_system |
epss |
| scoring_elements |
0.85629 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5832 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5832
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkqw-vkvb-gydh |
|
| 149 |
| url |
VCID-fmzm-hb5j-dyfe |
| vulnerability_id |
VCID-fmzm-hb5j-dyfe |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75711 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75625 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75627 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75658 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75638 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75672 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00901 |
| scoring_system |
epss |
| scoring_elements |
0.75724 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2203
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fmzm-hb5j-dyfe |
|
| 150 |
| url |
VCID-fnf4-fykj-p3f7 |
| vulnerability_id |
VCID-fnf4-fykj-p3f7 |
| summary |
WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0986 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84269 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84282 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84303 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.8433 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84348 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84341 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84359 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.8436 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02177 |
| scoring_system |
epss |
| scoring_elements |
0.84363 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0986 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-0986
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fnf4-fykj-p3f7 |
|
| 151 |
| url |
VCID-fpwa-74w6-mugt |
| vulnerability_id |
VCID-fpwa-74w6-mugt |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87723 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87734 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87747 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.8777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87776 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87782 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87781 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87795 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87794 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03606 |
| scoring_system |
epss |
| scoring_elements |
0.87792 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16780 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16780
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fpwa-74w6-mugt |
|
| 152 |
| url |
VCID-fqna-8mh3-rkd8 |
| vulnerability_id |
VCID-fqna-8mh3-rkd8 |
| summary |
Cross-site request forgery (CSRF) vulnerability in wp-admin/index.php in WordPress 3.4.2 allows remote attackers to hijack the authentication of administrators for requests that modify an RSS URL via a dashboard_incoming_links edit action. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35934 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35888 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36079 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35994 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36023 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35985 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3596 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35999 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35984 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4448 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4448
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fqna-8mh3-rkd8 |
|
| 153 |
| url |
VCID-fra3-hye6-kqh7 |
| vulnerability_id |
VCID-fra3-hye6-kqh7 |
| summary |
Insecure Deserialization of untrusted data in rmccue/requests
### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
* https://github.com/ambionics/phpggc/issues/52
* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
Originally fixed in WordPress 5.5.2:
* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
Related Security Advisories:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
* https://nvd.nist.gov/vuln/detail/CVE-2020-28032
Notification to the Requests repo including a fix in:
* https://github.com/rmccue/Requests/pull/421 and
* https://github.com/rmccue/Requests/pull/422
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Request](https://github.com/WordPress/Requests/) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.8451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84489 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84493 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.845 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84475 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84418 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84512 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84454 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.02219 |
| scoring_system |
epss |
| scoring_elements |
0.84433 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-29476, GHSA-52qp-jpq7-6c54
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fra3-hye6-kqh7 |
|
| 154 |
| url |
VCID-fuma-nkmd-zkc1 |
| vulnerability_id |
VCID-fuma-nkmd-zkc1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87745 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87746 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87678 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87689 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87703 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87724 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.8773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87735 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.03574 |
| scoring_system |
epss |
| scoring_elements |
0.87747 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17673 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17673
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fuma-nkmd-zkc1 |
|
| 155 |
| url |
VCID-fykj-9gba-rqgn |
| vulnerability_id |
VCID-fykj-9gba-rqgn |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69101 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69007 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69024 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69044 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69025 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69075 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69095 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69103 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69121 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9036 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9036
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fykj-9gba-rqgn |
|
| 156 |
| url |
VCID-fzyt-wpgd-byh1 |
| vulnerability_id |
VCID-fzyt-wpgd-byh1 |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0700 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00793 |
| scoring_system |
epss |
| scoring_elements |
0.73888 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00793 |
| scoring_system |
epss |
| scoring_elements |
0.73912 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00793 |
| scoring_system |
epss |
| scoring_elements |
0.73877 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77761 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.778 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77728 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77756 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0700 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0700
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyt-wpgd-byh1 |
|
| 157 |
| url |
VCID-gakg-ky9v-ayej |
| vulnerability_id |
VCID-gakg-ky9v-ayej |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52228 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52271 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52261 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52313 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52308 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52358 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52366 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5237 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52354 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6635 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6635
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gakg-ky9v-ayej |
|
| 158 |
| url |
VCID-gfey-nhj7-6fap |
| vulnerability_id |
VCID-gfey-nhj7-6fap |
| summary |
wordpress cookie authentication vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81363 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81385 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81384 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81412 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81438 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81426 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81419 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81457 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01551 |
| scoring_system |
epss |
| scoring_elements |
0.81458 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6013 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-6013
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfey-nhj7-6fap |
|
| 159 |
| url |
VCID-ggs8-1k6e-ebc8 |
| vulnerability_id |
VCID-ggs8-1k6e-ebc8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7989 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52487 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52503 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52352 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52425 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.5239 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52443 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52437 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52473 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52456 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52496 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7989 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7989
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ggs8-1k6e-ebc8 |
|
| 160 |
| url |
VCID-ghn9-muv6-17d7 |
| vulnerability_id |
VCID-ghn9-muv6-17d7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14723 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.9325 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93242 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93196 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93205 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93209 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93207 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93219 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93224 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93221 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93222 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.10428 |
| scoring_system |
epss |
| scoring_elements |
0.93238 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14723 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14723
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ghn9-muv6-17d7 |
|
| 161 |
| url |
VCID-gwks-aqn7-mud4 |
| vulnerability_id |
VCID-gwks-aqn7-mud4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9065 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87627 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87636 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87649 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.8765 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87678 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87689 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87684 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87696 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87697 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03545 |
| scoring_system |
epss |
| scoring_elements |
0.87694 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9065 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9065
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gwks-aqn7-mud4 |
|
| 162 |
| url |
VCID-gy54-apzn-7kef |
| vulnerability_id |
VCID-gy54-apzn-7kef |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04185 |
| scoring_system |
epss |
| scoring_elements |
0.88666 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.04185 |
| scoring_system |
epss |
| scoring_elements |
0.88682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.04185 |
| scoring_system |
epss |
| scoring_elements |
0.88683 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.04185 |
| scoring_system |
epss |
| scoring_elements |
0.88701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.04185 |
| scoring_system |
epss |
| scoring_elements |
0.88657 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90776 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90773 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90772 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90761 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.9076 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.06074 |
| scoring_system |
epss |
| scoring_elements |
0.90757 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28036 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28036
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gy54-apzn-7kef |
|
| 163 |
| url |
VCID-gz89-rnrc-2ubc |
| vulnerability_id |
VCID-gz89-rnrc-2ubc |
| summary |
wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2403 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86797 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86808 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.8682 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.8684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86849 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86857 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.8687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86874 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03128 |
| scoring_system |
epss |
| scoring_elements |
0.86875 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2403 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2403
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gz89-rnrc-2ubc |
|
| 164 |
| url |
VCID-h1fb-65br-93fb |
| vulnerability_id |
VCID-h1fb-65br-93fb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5838 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82481 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82477 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82367 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82381 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82399 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82396 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82431 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82449 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82445 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.8244 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01728 |
| scoring_system |
epss |
| scoring_elements |
0.82476 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5838 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5838
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h1fb-65br-93fb |
|
| 165 |
| url |
VCID-h2mz-4fad-9qdj |
| vulnerability_id |
VCID-h2mz-4fad-9qdj |
| summary |
Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5295 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.6589 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65931 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65961 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65928 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65979 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.6601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65996 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65966 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.66001 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.66015 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.66003 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5295 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5295
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h2mz-4fad-9qdj |
|
| 166 |
| url |
VCID-h3ab-qy7a-r3ea |
| vulnerability_id |
VCID-h3ab-qy7a-r3ea |
| summary |
SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2108 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77587 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77594 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.7762 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77602 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.7763 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77637 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01061 |
| scoring_system |
epss |
| scoring_elements |
0.77681 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-2108 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-2108
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h3ab-qy7a-r3ea |
|
| 167 |
| url |
VCID-h4xu-vw5g-x3gw |
| vulnerability_id |
VCID-h4xu-vw5g-x3gw |
| summary |
Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63735 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.6378 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63848 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63814 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1796 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1796
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h4xu-vw5g-x3gw |
|
| 168 |
| url |
VCID-h5up-s13c-2ygg |
| vulnerability_id |
VCID-h5up-s13c-2ygg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43497 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.8128 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81265 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81243 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81279 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81281 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81239 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01519 |
| scoring_system |
epss |
| scoring_elements |
0.81244 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43497 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://wordpress.org/download/ |
| reference_id |
download |
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:09:53Z/ |
|
|
| url |
https://wordpress.org/download/ |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43497
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h5up-s13c-2ygg |
|
| 169 |
| url |
VCID-h644-6au9-q3c6 |
| vulnerability_id |
VCID-h644-6au9-q3c6 |
| summary |
WordPress is vulnerable to an SQL injection vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1012 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.82998 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.8305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83058 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83074 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83068 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83102 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01865 |
| scoring_system |
epss |
| scoring_elements |
0.83105 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1012 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1012
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h644-6au9-q3c6 |
|
| 170 |
| url |
VCID-h97y-a92u-2fay |
| vulnerability_id |
VCID-h97y-a92u-2fay |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28040 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53881 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53792 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53818 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53844 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.5389 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53873 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53857 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.539 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28040 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28040
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h97y-a92u-2fay |
|
| 171 |
| url |
VCID-hamd-mn9k-q3f5 |
| vulnerability_id |
VCID-hamd-mn9k-q3f5 |
| summary |
Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4769 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95119 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95071 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95082 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95084 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95091 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95095 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.951 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95102 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.1766 |
| scoring_system |
epss |
| scoring_elements |
0.95117 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4769 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-4769
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hamd-mn9k-q3f5 |
|
| 172 |
| url |
VCID-hjhs-79fd-xff1 |
| vulnerability_id |
VCID-hjhs-79fd-xff1 |
| summary |
wp-comments-post.php in WordPress before 3.3.2 supports offsite redirects, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2404 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84762 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84781 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84782 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84805 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84812 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.8483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84826 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84821 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84843 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84844 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84842 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2404 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2404
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjhs-79fd-xff1 |
|
| 173 |
| url |
VCID-hkp2-z1em-x3gu |
| vulnerability_id |
VCID-hkp2-z1em-x3gu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16510 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88702 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88637 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88662 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88663 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88681 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88699 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88692 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.04169 |
| scoring_system |
epss |
| scoring_elements |
0.88706 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16510 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16510
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hkp2-z1em-x3gu |
|
| 174 |
| url |
VCID-hndb-7b4f-7bbw |
| vulnerability_id |
VCID-hndb-7b4f-7bbw |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88936 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.8894 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88874 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88897 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88899 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88918 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88923 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88929 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88928 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.04337 |
| scoring_system |
epss |
| scoring_elements |
0.88942 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16223
|
| risk_score |
9.8 |
| exploitability |
2.0 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hndb-7b4f-7bbw |
|
| 175 |
| url |
VCID-hq5p-xuuk-33f7 |
| vulnerability_id |
VCID-hq5p-xuuk-33f7 |
| summary |
WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.7928 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79279 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79209 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79225 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.7925 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79281 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79266 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79255 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01241 |
| scoring_system |
epss |
| scoring_elements |
0.79282 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9263 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9263
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hq5p-xuuk-33f7 |
|
| 176 |
| url |
VCID-hrr1-ygkz-4bhd |
| vulnerability_id |
VCID-hrr1-ygkz-4bhd |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76665 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76668 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76697 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76679 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76711 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76722 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.7675 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.7673 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76763 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.76768 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00977 |
| scoring_system |
epss |
| scoring_elements |
0.7676 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4340 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4340
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrr1-ygkz-4bhd |
|
| 177 |
| url |
VCID-htec-cnsd-4ke4 |
| vulnerability_id |
VCID-htec-cnsd-4ke4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54149 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54125 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54176 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54224 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54227 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54209 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21663 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21663
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-htec-cnsd-4ke4 |
|
| 178 |
| url |
VCID-htr5-ugyh-7yaz |
| vulnerability_id |
VCID-htr5-ugyh-7yaz |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.89634 |
| scoring_system |
epss |
| scoring_elements |
0.99565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.99577 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.99578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.99576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.9958 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.99581 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.89975 |
| scoring_system |
epss |
| scoring_elements |
0.99579 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29447 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-29447
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-htr5-ugyh-7yaz |
|
| 179 |
| url |
VCID-hx1m-3ehs-pudy |
| vulnerability_id |
VCID-hx1m-3ehs-pudy |
| summary |
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2401 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.7735 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77357 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77384 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77364 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77394 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.7743 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77406 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77444 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01038 |
| scoring_system |
epss |
| scoring_elements |
0.77436 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2401 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2401
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hx1m-3ehs-pudy |
|
| 180 |
| url |
VCID-hxky-9sa6-4udb |
| vulnerability_id |
VCID-hxky-9sa6-4udb |
| summary |
Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the query string in a POST operation that is not properly handled by the "Duplicate comment detected" feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0287 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69417 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69444 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69474 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.6949 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69512 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69496 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.6953 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.6951 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0287 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0287
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hxky-9sa6-4udb |
|
| 181 |
| url |
VCID-hyae-gf44-4qaa |
| vulnerability_id |
VCID-hyae-gf44-4qaa |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2199 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74593 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74499 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74504 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74531 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74553 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74556 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74548 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74585 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2199 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2199
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyae-gf44-4qaa |
|
| 182 |
| url |
VCID-j33g-aex7-uke8 |
| vulnerability_id |
VCID-j33g-aex7-uke8 |
| summary |
The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3330 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96023 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.95971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.95978 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.95985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.95989 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.95999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96001 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96007 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96017 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.23773 |
| scoring_system |
epss |
| scoring_elements |
0.96022 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3330 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3330
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j33g-aex7-uke8 |
|
| 183 |
| url |
VCID-j45z-kwz2-b7hn |
| vulnerability_id |
VCID-j45z-kwz2-b7hn |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9031 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69521 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69406 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69417 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69434 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69413 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69464 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69479 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69501 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69486 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69472 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00601 |
| scoring_system |
epss |
| scoring_elements |
0.69512 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9031 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9031
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j45z-kwz2-b7hn |
|
| 184 |
| url |
VCID-j4bb-d6da-w3de |
| vulnerability_id |
VCID-j4bb-d6da-w3de |
| summary |
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38000 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.573 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57329 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57343 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57303 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.5733 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57305 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38000 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38000
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j4bb-d6da-w3de |
|
| 185 |
| url |
VCID-janm-1e9e-abb5 |
| vulnerability_id |
VCID-janm-1e9e-abb5 |
| summary |
WordPress before 3.4.1 does not properly restrict access to post contents such as private or draft posts, which allows remote authors or contributors to obtain sensitive information via unknown vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71245 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71253 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.7127 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71286 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.713 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71307 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71291 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71337 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71344 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71323 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3385 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3385
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-janm-1e9e-abb5 |
|
| 186 |
| url |
VCID-jf98-kean-p3b3 |
| vulnerability_id |
VCID-jf98-kean-p3b3 |
| summary |
In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6818 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92753 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92706 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92713 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92719 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92717 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92732 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92738 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92736 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.09282 |
| scoring_system |
epss |
| scoring_elements |
0.92748 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6818 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6818
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jf98-kean-p3b3 |
|
| 187 |
| url |
VCID-jgcr-7hau-1yff |
| vulnerability_id |
VCID-jgcr-7hau-1yff |
| summary |
wordpress-mu: XSS vulnerability in RSS Feed Generator |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.8693 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86853 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86882 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86897 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86905 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86918 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86908 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03157 |
| scoring_system |
epss |
| scoring_elements |
0.86925 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5278 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5278
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jgcr-7hau-1yff |
|
| 188 |
| url |
VCID-jh7f-mzcc-f3e9 |
| vulnerability_id |
VCID-jh7f-mzcc-f3e9 |
| summary |
WordPress fails to sufficiently check the format of cached username data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2702 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80657 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80686 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80682 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.8071 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.8072 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80736 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80723 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.8075 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80751 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0144 |
| scoring_system |
epss |
| scoring_elements |
0.80753 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2702 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-2702
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jh7f-mzcc-f3e9 |
|
| 189 |
| url |
VCID-jjjw-sspg-q3c3 |
| vulnerability_id |
VCID-jjjw-sspg-q3c3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20041 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.8014 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80192 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80211 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80196 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80188 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.80217 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01366 |
| scoring_system |
epss |
| scoring_elements |
0.8022 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20041 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20041
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjjw-sspg-q3c3 |
|
| 190 |
| url |
VCID-jmhr-atwp-5kee |
| vulnerability_id |
VCID-jmhr-atwp-5kee |
| summary |
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31211 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97326 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97322 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97325 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97298 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97303 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.9731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97313 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.39711 |
| scoring_system |
epss |
| scoring_elements |
0.97314 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31211 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31211
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhr-atwp-5kee |
|
| 191 |
| url |
VCID-jmx6-p5md-dycf |
| vulnerability_id |
VCID-jmx6-p5md-dycf |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5266 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98936 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.9892 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98924 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98926 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98928 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.9893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98931 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98933 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.76306 |
| scoring_system |
epss |
| scoring_elements |
0.98934 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5266 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5266
|
| risk_score |
9.0 |
| exploitability |
2.0 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jmx6-p5md-dycf |
|
| 192 |
| url |
VCID-jntp-tjnu-ekbk |
| vulnerability_id |
VCID-jntp-tjnu-ekbk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.8992 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89863 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89866 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89879 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89885 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.05172 |
| scoring_system |
epss |
| scoring_elements |
0.89905 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2222 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2222
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jntp-tjnu-ekbk |
|
| 193 |
| url |
VCID-jr4w-6wqz-cbe3 |
| vulnerability_id |
VCID-jr4w-6wqz-cbe3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96761 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.9677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96785 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96787 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.9679 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96796 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.968 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.31592 |
| scoring_system |
epss |
| scoring_elements |
0.96803 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0166 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0166
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jr4w-6wqz-cbe3 |
|
| 194 |
| url |
VCID-juwh-zmez-dfhy |
| vulnerability_id |
VCID-juwh-zmez-dfhy |
| summary |
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62554 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62415 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62473 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62505 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62524 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.6254 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62559 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62548 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62566 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62572 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0237 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0237
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-juwh-zmez-dfhy |
|
| 195 |
| url |
VCID-k52x-fa57-hkfk |
| vulnerability_id |
VCID-k52x-fa57-hkfk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89353 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89356 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89298 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89318 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.8932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89336 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.8935 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89347 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89343 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.04685 |
| scoring_system |
epss |
| scoring_elements |
0.89357 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16219 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16219
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k52x-fa57-hkfk |
|
| 196 |
| url |
VCID-k6a1-ag3k-y7d1 |
| vulnerability_id |
VCID-k6a1-ag3k-y7d1 |
| summary |
In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9066 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.8043 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80436 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80457 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80476 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80504 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80511 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01408 |
| scoring_system |
epss |
| scoring_elements |
0.80514 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9066 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9066
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k6a1-ag3k-y7d1 |
|
| 197 |
| url |
VCID-k96h-dr15-ufhv |
| vulnerability_id |
VCID-k96h-dr15-ufhv |
| summary |
PHPMailer Shell command injection
PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`.
### Impact
Shell command injection, remotely exploitable if host application does not filter user data appropriately.
### Patches
Fixed in 1.7.4
### Workarounds
Filter and validate user-supplied data before putting in the into the `Sender` property.
### References
https://nvd.nist.gov/vuln/detail/CVE-2007-3215
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89016 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.88962 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.88978 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.88981 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.88999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89004 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89017 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89021 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.88954 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.04403 |
| scoring_system |
epss |
| scoring_elements |
0.89011 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3215 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3215, GHSA-6h78-85v2-mmch
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k96h-dr15-ufhv |
|
| 198 |
| url |
VCID-kdb9-npxe-tyc4 |
| vulnerability_id |
VCID-kdb9-npxe-tyc4 |
| summary |
WordPress before 3.0.1, when a Multisite installation is used, permanently retains the "site administrators can add users" option once changed, which might allow remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances via an add action after a temporary change. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45913 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45863 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45919 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45916 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45939 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.4591 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45917 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45969 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45964 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45909 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5297 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5297
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdb9-npxe-tyc4 |
|
| 199 |
| url |
VCID-kdjp-qmxc-9qat |
| vulnerability_id |
VCID-kdjp-qmxc-9qat |
| summary |
The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0539 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80305 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80233 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80261 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.8029 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80275 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80269 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80299 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0138 |
| scoring_system |
epss |
| scoring_elements |
0.80301 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0539 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0539
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdjp-qmxc-9qat |
|
| 200 |
| url |
VCID-kk83-bnn5-tuar |
| vulnerability_id |
VCID-kk83-bnn5-tuar |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87556 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87565 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87579 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87581 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87606 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87618 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87613 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.8761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87625 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.03502 |
| scoring_system |
epss |
| scoring_elements |
0.87623 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4048 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4048
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kk83-bnn5-tuar |
|
| 201 |
| url |
VCID-kkqs-rbpz-wqhf |
| vulnerability_id |
VCID-kkqs-rbpz-wqhf |
| summary |
Cross-site scripting (XSS) vulnerability in the refreshAdvancedAccessibilityOfItem function in wp-admin/js/nav-menu.js in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via an accessibility-helper title. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81186 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81091 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81116 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.8115 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81168 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81154 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81148 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01502 |
| scoring_system |
epss |
| scoring_elements |
0.81184 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5733 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5733
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kkqs-rbpz-wqhf |
|
| 202 |
| url |
VCID-kn9s-5v5u-d3fj |
| vulnerability_id |
VCID-kn9s-5v5u-d3fj |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20043 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78609 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78615 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78627 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78653 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.7866 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78685 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78658 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0117 |
| scoring_system |
epss |
| scoring_elements |
0.78681 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-20043 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-20043
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kn9s-5v5u-d3fj |
|
| 203 |
| url |
VCID-kpem-j9we-vufs |
| vulnerability_id |
VCID-kpem-j9we-vufs |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67391 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67292 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67329 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67352 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.6738 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67393 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67414 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67401 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67413 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5492 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5492
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kpem-j9we-vufs |
|
| 204 |
| url |
VCID-ksx9-t81e-pkb3 |
| vulnerability_id |
VCID-ksx9-t81e-pkb3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79222 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79149 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.7918 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79166 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79223 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79208 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79226 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9038 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9038
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksx9-t81e-pkb3 |
|
| 205 |
| url |
VCID-kybz-d1hv-g3ae |
| vulnerability_id |
VCID-kybz-d1hv-g3ae |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4338 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92853 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92856 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92863 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92872 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92871 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92881 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92883 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.09588 |
| scoring_system |
epss |
| scoring_elements |
0.92888 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4338 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4338
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kybz-d1hv-g3ae |
|
| 206 |
| url |
VCID-kyzb-5kb1-j7cf |
| vulnerability_id |
VCID-kyzb-5kb1-j7cf |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1564 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.7141 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.7143 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71335 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71342 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.7136 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71334 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71411 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71396 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00673 |
| scoring_system |
epss |
| scoring_elements |
0.71425 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1564 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1564
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kyzb-5kb1-j7cf |
|
| 207 |
| url |
VCID-m7yz-rv7g-jbat |
| vulnerability_id |
VCID-m7yz-rv7g-jbat |
| summary |
Flaws in WordPress allow a Denial of Service, the disclosure of user
metadata and the overwriting of restricted files. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-5705 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89572 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89525 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89538 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89539 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89555 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.8956 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89567 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89566 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89574 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04873 |
| scoring_system |
epss |
| scoring_elements |
0.89575 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-5705 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-5705
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7yz-rv7g-jbat |
|
| 208 |
| url |
VCID-m8mf-t2td-67h7 |
| vulnerability_id |
VCID-m8mf-t2td-67h7 |
| summary |
WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6307 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70437 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70397 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70412 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70421 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70406 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70448 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70457 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70373 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6307 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6307
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m8mf-t2td-67h7 |
|
| 209 |
| url |
VCID-mcjm-c2c8-dkdp |
| vulnerability_id |
VCID-mcjm-c2c8-dkdp |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in the "post comment" functionality of WordPress 2.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) website, and (3) comment parameters. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0985 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75491 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75577 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75556 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.7559 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75581 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0985 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-0985
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mcjm-c2c8-dkdp |
|
| 210 |
| url |
VCID-meg6-wfw8-63cn |
| vulnerability_id |
VCID-meg6-wfw8-63cn |
| summary |
Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93231 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93242 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93246 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93262 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93267 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.10487 |
| scoring_system |
epss |
| scoring_elements |
0.93274 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3890 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3890
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-meg6-wfw8-63cn |
|
| 211 |
| url |
VCID-mfvf-n63j-cfaf |
| vulnerability_id |
VCID-mfvf-n63j-cfaf |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9034 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98771 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98755 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98759 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98761 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98762 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98764 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98765 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.98769 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.72483 |
| scoring_system |
epss |
| scoring_elements |
0.9877 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9034 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9034
|
| risk_score |
9.0 |
| exploitability |
2.0 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvf-n63j-cfaf |
|
| 212 |
| url |
VCID-msku-2thw-jfat |
| vulnerability_id |
VCID-msku-2thw-jfat |
| summary |
several |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.4829 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48325 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48346 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48298 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48353 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48372 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48357 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48408 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48402 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48356 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5739 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-5739
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-msku-2thw-jfat |
|
| 213 |
| url |
VCID-mu7j-73tw-xbc6 |
| vulnerability_id |
VCID-mu7j-73tw-xbc6 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2213 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95689 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95639 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95648 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95654 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95656 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95664 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95668 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95672 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95675 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.21244 |
| scoring_system |
epss |
| scoring_elements |
0.95687 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2213 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-2213
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mu7j-73tw-xbc6 |
|
| 214 |
| url |
VCID-mwcj-thjj-nyfd |
| vulnerability_id |
VCID-mwcj-thjj-nyfd |
| summary |
A flaw in WordPress allows registered WordPress users to elevate
privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3390 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80105 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80112 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80132 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.8012 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80148 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80155 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80174 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80159 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.8015 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80179 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.8018 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0136 |
| scoring_system |
epss |
| scoring_elements |
0.80183 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3390 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-3390
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mwcj-thjj-nyfd |
|
| 215 |
| url |
VCID-mxvk-932h-c7dp |
| vulnerability_id |
VCID-mxvk-932h-c7dp |
| summary |
WordPress is vulnerable to SQL injection, information disclosure, and
cross-site scripting attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0109 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80365 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80275 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80283 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80304 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80292 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.8032 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80331 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80335 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.80358 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01387 |
| scoring_system |
epss |
| scoring_elements |
0.8036 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0109 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0109
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxvk-932h-c7dp |
|
| 216 |
| url |
VCID-n2ep-cw4n-gkda |
| vulnerability_id |
VCID-n2ep-cw4n-gkda |
| summary |
Cross-site scripting (XSS) vulnerability in wp-includes/general-template.php in WordPress before 20070309 allows remote attackers to inject arbitrary web script or HTML via the year parameter in the wp_title function. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90332 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90275 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90296 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.9031 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90317 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90325 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90318 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.05601 |
| scoring_system |
epss |
| scoring_elements |
0.90334 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1894 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1894
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n2ep-cw4n-gkda |
|
| 217 |
| url |
VCID-n7ne-unru-7fhn |
| vulnerability_id |
VCID-n7ne-unru-7fhn |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28035 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.9117 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91092 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91098 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91114 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91133 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91141 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06561 |
| scoring_system |
epss |
| scoring_elements |
0.91166 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28035 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28035
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ne-unru-7fhn |
|
| 218 |
| url |
VCID-ncux-8918-rygk |
| vulnerability_id |
VCID-ncux-8918-rygk |
| summary |
wordpress: SQL injection when certain DB charsets are used |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6318 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87675 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.8767 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87663 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87678 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87653 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03532 |
| scoring_system |
epss |
| scoring_elements |
0.87659 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04541 |
| scoring_system |
epss |
| scoring_elements |
0.89136 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.04541 |
| scoring_system |
epss |
| scoring_elements |
0.89152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.04541 |
| scoring_system |
epss |
| scoring_elements |
0.89154 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.04541 |
| scoring_system |
epss |
| scoring_elements |
0.89129 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6318 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-6318
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ncux-8918-rygk |
|
| 219 |
| url |
VCID-ng4k-69hk-9ueu |
| vulnerability_id |
VCID-ng4k-69hk-9ueu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14990 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59653 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59668 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59513 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59586 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.5961 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.5958 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59631 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59644 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59664 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59627 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59661 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14990 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14990
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-69hk-9ueu |
|
| 220 |
| url |
VCID-ngkc-cwzj-nbdk |
| vulnerability_id |
VCID-ngkc-cwzj-nbdk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28033 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79428 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79348 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79355 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79377 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.7939 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79406 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79395 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01258 |
| scoring_system |
epss |
| scoring_elements |
0.79425 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28033 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28033
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ngkc-cwzj-nbdk |
|
| 221 |
| url |
VCID-nj6g-ewk1-r7f1 |
| vulnerability_id |
VCID-nj6g-ewk1-r7f1 |
| summary |
Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4566 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89315 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89319 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.8926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89266 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.8928 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89304 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89313 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.8931 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.89307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.04653 |
| scoring_system |
epss |
| scoring_elements |
0.8932 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4566 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4566
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nj6g-ewk1-r7f1 |
|
| 222 |
| url |
VCID-nrq5-a7qq-mucd |
| vulnerability_id |
VCID-nrq5-a7qq-mucd |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) gallery shortcodes or (2) the content of a post. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0236 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61817 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.6166 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61763 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61734 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61782 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61798 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61819 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61806 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61786 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61829 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61834 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0236 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0236
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nrq5-a7qq-mucd |
|
| 223 |
| url |
VCID-ns2b-cr6m-t7gq |
| vulnerability_id |
VCID-ns2b-cr6m-t7gq |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5732 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82249 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82154 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82175 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82198 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82205 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82225 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82217 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82211 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01687 |
| scoring_system |
epss |
| scoring_elements |
0.82248 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5732 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5732
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ns2b-cr6m-t7gq |
|
| 224 |
| url |
VCID-ny68-2wje-q3df |
| vulnerability_id |
VCID-ny68-2wje-q3df |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90057 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.9006 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90071 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90092 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90105 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.901 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90117 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05377 |
| scoring_system |
epss |
| scoring_elements |
0.90114 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20153 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20153
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ny68-2wje-q3df |
|
| 225 |
| url |
VCID-nztu-n4pg-p3be |
| vulnerability_id |
VCID-nztu-n4pg-p3be |
| summary |
Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77387 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77297 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77332 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77313 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77343 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77352 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77379 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77359 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77395 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01033 |
| scoring_system |
epss |
| scoring_elements |
0.77394 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2627 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-2627
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nztu-n4pg-p3be |
|
| 226 |
| url |
VCID-p1c8-hj6e-mkg4 |
| vulnerability_id |
VCID-p1c8-hj6e-mkg4 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46332 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46265 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46305 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46327 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46273 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46352 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46333 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.4639 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46387 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5204
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p1c8-hj6e-mkg4 |
|
| 227 |
| url |
VCID-p371-1hxy-eueh |
| vulnerability_id |
VCID-p371-1hxy-eueh |
| summary |
WordPress fails to sufficiently check the format of cached username data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96805 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96829 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.9683 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96831 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96837 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96841 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.32191 |
| scoring_system |
epss |
| scoring_elements |
0.96843 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2667 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-2667
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p371-1hxy-eueh |
|
| 228 |
| url |
VCID-p4r5-fz39-hkej |
| vulnerability_id |
VCID-p4r5-fz39-hkej |
| summary |
The XMLRPC API in WordPress before 3.5.1 allows remote attackers to send HTTP requests to intranet servers, and conduct port-scanning attacks, by specifying a crafted source URL for a pingback, related to a Server-Side Request Forgery (SSRF) issue. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98205 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98182 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98185 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98189 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.9819 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98195 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98198 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.5836 |
| scoring_system |
epss |
| scoring_elements |
0.98204 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0235 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0235
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p4r5-fz39-hkej |
|
| 229 |
| url |
VCID-pb81-1zfe-hqfb |
| vulnerability_id |
VCID-pb81-1zfe-hqfb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5834 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79093 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79096 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79019 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79025 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79036 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.7906 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79068 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79092 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01221 |
| scoring_system |
epss |
| scoring_elements |
0.79078 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5834 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5834
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pb81-1zfe-hqfb |
|
| 230 |
| url |
VCID-pc7x-gaqm-e7dj |
| vulnerability_id |
VCID-pc7x-gaqm-e7dj |
| summary |
Wordpress contains several cross-site scripting, cross-site request forgery
and information leak vulnerabilities. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68959 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68861 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.689 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.6888 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68931 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.6895 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68972 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68958 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68928 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68969 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68979 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1230 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1230
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pc7x-gaqm-e7dj |
|
| 231 |
| url |
VCID-pd4w-3ttq-9yfs |
| vulnerability_id |
VCID-pd4w-3ttq-9yfs |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9035 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69101 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69007 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69024 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69044 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69025 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69075 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69095 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69103 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00586 |
| scoring_system |
epss |
| scoring_elements |
0.69121 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9035 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9035
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4w-3ttq-9yfs |
|
| 232 |
| url |
VCID-pgn4-7tt1-v7ct |
| vulnerability_id |
VCID-pgn4-7tt1-v7ct |
| summary |
wordpress: sql column truncation flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94494 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94441 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94453 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94463 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94466 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.9447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94472 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.94487 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.14591 |
| scoring_system |
epss |
| scoring_elements |
0.9449 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-4106 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-4106
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pgn4-7tt1-v7ct |
|
| 233 |
| url |
VCID-pkjb-8649-fqd2 |
| vulnerability_id |
VCID-pkjb-8649-fqd2 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28034 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85851 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85761 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85797 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85816 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85841 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85853 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02678 |
| scoring_system |
epss |
| scoring_elements |
0.85857 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28034 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28034
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pkjb-8649-fqd2 |
|
| 234 |
| url |
VCID-psca-f78j-hbc2 |
| vulnerability_id |
VCID-psca-f78j-hbc2 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90701 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90642 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90657 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90676 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.9069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90691 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90687 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90706 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.05996 |
| scoring_system |
epss |
| scoring_elements |
0.90703 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28039 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28039
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-psca-f78j-hbc2 |
|
| 235 |
| url |
VCID-pv2z-zrfb-83fy |
| vulnerability_id |
VCID-pv2z-zrfb-83fy |
| summary |
Cross-site scripting (XSS) vulnerability in index.php in the Blue Memories theme 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757 and CVE-2007-4014. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79679 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79685 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.7972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79742 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79725 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79749 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01299 |
| scoring_system |
epss |
| scoring_elements |
0.79752 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4165 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4165
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pv2z-zrfb-83fy |
|
| 236 |
| url |
VCID-pwgx-qq3w-5baf |
| vulnerability_id |
VCID-pwgx-qq3w-5baf |
| summary |
WordPress: Resource exhaustion (DoS) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90729 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.9074 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90745 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06065 |
| scoring_system |
epss |
| scoring_elements |
0.90754 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.08278 |
| scoring_system |
epss |
| scoring_elements |
0.92244 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.08278 |
| scoring_system |
epss |
| scoring_elements |
0.92256 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.08278 |
| scoring_system |
epss |
| scoring_elements |
0.92255 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3622 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3622
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwgx-qq3w-5baf |
|
| 237 |
| url |
VCID-pyzc-scrd-bufa |
| vulnerability_id |
VCID-pyzc-scrd-bufa |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80576 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80583 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80605 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80635 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80651 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80638 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.8063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80659 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80663 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11025 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11025
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pyzc-scrd-bufa |
|
| 238 |
| url |
VCID-pz3b-294m-nqfn |
| vulnerability_id |
VCID-pz3b-294m-nqfn |
| summary |
Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10101 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92757 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92769 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92766 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92775 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.9278 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92785 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92784 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92795 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92796 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.09391 |
| scoring_system |
epss |
| scoring_elements |
0.92799 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10101 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10101
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pz3b-294m-nqfn |
|
| 239 |
| url |
VCID-q146-rfqv-1ych |
| vulnerability_id |
VCID-q146-rfqv-1ych |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14719 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97863 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97865 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97832 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97839 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97842 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97849 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97853 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97855 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.50739 |
| scoring_system |
epss |
| scoring_elements |
0.97862 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14719 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14719
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q146-rfqv-1ych |
|
| 240 |
| url |
VCID-q527-42sm-x7fz |
| vulnerability_id |
VCID-q527-42sm-x7fz |
| summary |
Unspecified vulnerability in wp-includes/js/swfobject.js in WordPress before 3.3.2 has unknown impact and attack vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2400 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82411 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82443 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.8244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82467 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82488 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.8252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82521 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01738 |
| scoring_system |
epss |
| scoring_elements |
0.82525 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2400 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2400
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q527-42sm-x7fz |
|
| 241 |
| url |
VCID-q84d-utmc-g3fn |
| vulnerability_id |
VCID-q84d-utmc-g3fn |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68824 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68842 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6892 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68891 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68932 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68942 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68921 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25286 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-25286
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q84d-utmc-g3fn |
|
| 242 |
| url |
VCID-q9xz-t5cc-2uf7 |
| vulnerability_id |
VCID-q9xz-t5cc-2uf7 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5715 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96544 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96543 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96497 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.9651 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96513 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96524 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.9653 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.28517 |
| scoring_system |
epss |
| scoring_elements |
0.96537 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5715 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5715
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q9xz-t5cc-2uf7 |
|
| 243 |
| url |
VCID-qj5d-cu2t-efah |
| vulnerability_id |
VCID-qj5d-cu2t-efah |
| summary |
Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52108 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52152 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52179 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52143 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52197 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52193 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52244 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52228 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52214 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52256 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52239 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6762 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-6762
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qj5d-cu2t-efah |
|
| 244 |
| url |
VCID-qjdf-s39r-5bdb |
| vulnerability_id |
VCID-qjdf-s39r-5bdb |
| summary |
PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests
classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6112 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69477 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.6938 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69392 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69408 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69388 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69461 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69496 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6112 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6112, GHSA-fx5h-3786-h2w6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qjdf-s39r-5bdb |
|
| 245 |
| url |
VCID-qpsj-hsmm-6qa8 |
| vulnerability_id |
VCID-qpsj-hsmm-6qa8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6816 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.8569 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85587 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.856 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85618 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85624 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.8567 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02621 |
| scoring_system |
epss |
| scoring_elements |
0.85685 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6816 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6816
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpsj-hsmm-6qa8 |
|
| 246 |
| url |
VCID-qpzg-tnaj-3uab |
| vulnerability_id |
VCID-qpzg-tnaj-3uab |
| summary |
Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier, and possibly 2.1.x through 2.3.x, allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.82974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.82991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83004 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83001 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83026 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83033 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83049 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83076 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01859 |
| scoring_system |
epss |
| scoring_elements |
0.83079 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0193 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0193
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzg-tnaj-3uab |
|
| 247 |
| url |
VCID-qu9h-p3s6-8bd2 |
| vulnerability_id |
VCID-qu9h-p3s6-8bd2 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.9095 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90952 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90877 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90901 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90913 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.9092 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90929 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.06276 |
| scoring_system |
epss |
| scoring_elements |
0.90927 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17093 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17093
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qu9h-p3s6-8bd2 |
|
| 248 |
| url |
VCID-qwg1-c8b8-23gc |
| vulnerability_id |
VCID-qwg1-c8b8-23gc |
| summary |
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-1598 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77889 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.778 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77807 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77834 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77845 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.7785 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.7786 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77897 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01082 |
| scoring_system |
epss |
| scoring_elements |
0.77895 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-1598 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-1598
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwg1-c8b8-23gc |
|
| 249 |
| url |
VCID-qwk7-gv3y-97ck |
| vulnerability_id |
VCID-qwk7-gv3y-97ck |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80169 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.8009 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80117 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80105 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80134 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.8014 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80144 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80135 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80166 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2202 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2202
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwk7-gv3y-97ck |
|
| 250 |
| url |
VCID-r4qy-1wa6-t7gh |
| vulnerability_id |
VCID-r4qy-1wa6-t7gh |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17672 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90085 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90087 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90029 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90032 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90048 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90064 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90069 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90078 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.90076 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.05346 |
| scoring_system |
epss |
| scoring_elements |
0.9007 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17672 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-17672
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r4qy-1wa6-t7gh |
|
| 251 |
| url |
VCID-r5u7-bft7-6bd3 |
| vulnerability_id |
VCID-r5u7-bft7-6bd3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8295 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.9897 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98969 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98961 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98965 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98966 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.77097 |
| scoring_system |
epss |
| scoring_elements |
0.98967 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8295 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-8295
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r5u7-bft7-6bd3 |
|
| 252 |
| url |
VCID-rcvm-b2u5-43dc |
| vulnerability_id |
VCID-rcvm-b2u5-43dc |
| summary |
Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96649 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96658 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96664 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96677 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96679 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.9668 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96689 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.30259 |
| scoring_system |
epss |
| scoring_elements |
0.96697 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6897 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6897
|
| risk_score |
0.6 |
| exploitability |
2.0 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcvm-b2u5-43dc |
|
| 253 |
| url |
VCID-re92-3yew-1bft |
| vulnerability_id |
VCID-re92-3yew-1bft |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9037 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85676 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85579 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.8559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85608 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85614 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85634 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.8566 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85656 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.85675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02617 |
| scoring_system |
epss |
| scoring_elements |
0.8568 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9037 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9037
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-re92-3yew-1bft |
|
| 254 |
| url |
VCID-ruuu-vphs-5qap |
| vulnerability_id |
VCID-ruuu-vphs-5qap |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5240 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70304 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70334 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70357 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.7038 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70409 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70418 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5240 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5240
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ruuu-vphs-5qap |
|
| 255 |
| url |
VCID-rz89-bchd-zqge |
| vulnerability_id |
VCID-rz89-bchd-zqge |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9033 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74156 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.7407 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74076 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74102 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74074 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74107 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74122 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74143 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74125 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74119 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74166 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9033 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9033
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rz89-bchd-zqge |
|
| 256 |
| url |
VCID-s677-mr1w-q3he |
| vulnerability_id |
VCID-s677-mr1w-q3he |
| summary |
WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99349 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99338 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99339 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99342 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99344 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99346 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.84865 |
| scoring_system |
epss |
| scoring_elements |
0.99347 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1277 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1277
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s677-mr1w-q3he |
|
| 257 |
| url |
VCID-sany-su2d-73cn |
| vulnerability_id |
VCID-sany-su2d-73cn |
| summary |
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5487 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92497 |
| scoring_system |
epss |
| scoring_elements |
0.99732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.92497 |
| scoring_system |
epss |
| scoring_elements |
0.99734 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.92497 |
| scoring_system |
epss |
| scoring_elements |
0.99735 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.92497 |
| scoring_system |
epss |
| scoring_elements |
0.99736 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.92497 |
| scoring_system |
epss |
| scoring_elements |
0.99737 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5487 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5487
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sany-su2d-73cn |
|
| 258 |
| url |
VCID-sh9a-167m-57cw |
| vulnerability_id |
VCID-sh9a-167m-57cw |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76539 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76573 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76585 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76597 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76603 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76635 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76638 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00968 |
| scoring_system |
epss |
| scoring_elements |
0.76627 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5622 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5622
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sh9a-167m-57cw |
|
| 259 |
| url |
VCID-sj2p-hvgn-nbhe |
| vulnerability_id |
VCID-sj2p-hvgn-nbhe |
| summary |
wordpress: Malicious File Execution Vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83316 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83331 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.8337 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83394 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83384 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.8342 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01929 |
| scoring_system |
epss |
| scoring_elements |
0.83421 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2392 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-2392
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sj2p-hvgn-nbhe |
|
| 260 |
| url |
VCID-sjz4-5jm5-nfdy |
| vulnerability_id |
VCID-sjz4-5jm5-nfdy |
| summary |
Wordpress contains several cross-site scripting, cross-site request forgery
and information leak vulnerabilities. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92093 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92053 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92059 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92067 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92071 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92083 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92086 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.9209 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92097 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.07986 |
| scoring_system |
epss |
| scoring_elements |
0.92095 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1244 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1244
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjz4-5jm5-nfdy |
|
| 261 |
| url |
VCID-snd3-cbgy-ybb2 |
| vulnerability_id |
VCID-snd3-cbgy-ybb2 |
| summary |
SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2821 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90412 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90358 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90361 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90377 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90391 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90398 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05685 |
| scoring_system |
epss |
| scoring_elements |
0.90414 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-2821 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-2821
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snd3-cbgy-ybb2 |
|
| 262 |
| url |
VCID-srjh-2qnk-e7c6 |
| vulnerability_id |
VCID-srjh-2qnk-e7c6 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90825 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90757 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90763 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90774 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90784 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.9081 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90808 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90828 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.06131 |
| scoring_system |
epss |
| scoring_elements |
0.90826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6817 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6817
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-srjh-2qnk-e7c6 |
|
| 263 |
| url |
VCID-sszr-mn9y-kkhg |
| vulnerability_id |
VCID-sszr-mn9y-kkhg |
| summary |
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79503 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79498 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79471 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79501 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79451 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01268 |
| scoring_system |
epss |
| scoring_elements |
0.79437 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4973 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4973
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sszr-mn9y-kkhg |
|
| 264 |
| url |
VCID-swnk-8ave-bff2 |
| vulnerability_id |
VCID-swnk-8ave-bff2 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98027 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98032 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98034 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98036 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.9804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98041 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98046 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98047 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.98053 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.54862 |
| scoring_system |
epss |
| scoring_elements |
0.9805 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20148 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20148
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-swnk-8ave-bff2 |
|
| 265 |
| url |
VCID-sz3u-x51u-r3dn |
| vulnerability_id |
VCID-sz3u-x51u-r3dn |
| summary |
Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4483 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.63958 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.64016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.64043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.64003 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.64054 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00459 |
| scoring_system |
epss |
| scoring_elements |
0.64071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.6614 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66128 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66098 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66133 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66147 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66135 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-4483 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-4483
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sz3u-x51u-r3dn |
|
| 266 |
| url |
VCID-t4fg-hrp7-c7h9 |
| vulnerability_id |
VCID-t4fg-hrp7-c7h9 |
| summary |
WordPress before 4.9.2 has XSS in the Flash fallback files in MediaElement (under wp-includes/js/mediaelement). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5776 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86815 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86839 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86859 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.8688 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86871 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86888 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03133 |
| scoring_system |
epss |
| scoring_elements |
0.86894 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5776 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5776
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t4fg-hrp7-c7h9 |
|
| 267 |
| url |
VCID-t4mw-4vck-d7ek |
| vulnerability_id |
VCID-t4mw-4vck-d7ek |
| summary |
The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3129 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6976 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69772 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69788 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69764 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6985 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69835 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6982 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69872 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3129 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3129
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t4mw-4vck-d7ek |
|
| 268 |
| url |
VCID-tc97-uxfe-rqdc |
| vulnerability_id |
VCID-tc97-uxfe-rqdc |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5205 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34178 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34516 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34483 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34484 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34442 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5205 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5205
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tc97-uxfe-rqdc |
|
| 269 |
| url |
VCID-tcbf-ura1-mbfv |
| vulnerability_id |
VCID-tcbf-ura1-mbfv |
| summary |
Cross-site scripting (XSS) vulnerability in the media-playlists feature in WordPress before 3.9.x before 3.9.3 and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9032 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61954 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61796 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.619 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61871 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6192 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61937 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61947 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6197 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61974 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9032 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9032
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbf-ura1-mbfv |
|
| 270 |
| url |
VCID-tekr-xkck-pkfu |
| vulnerability_id |
VCID-tekr-xkck-pkfu |
| summary |
Multiple vulnerabilities in Asterisk might allow remote attackers to cause
a Denial of Service condition, or conduct other attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-7220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93033 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93041 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93045 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93053 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93058 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.9306 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93062 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93076 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.10024 |
| scoring_system |
epss |
| scoring_elements |
0.93082 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-7220 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-7220
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tekr-xkck-pkfu |
|
| 271 |
| url |
VCID-tf2e-bgq5-9ff5 |
| vulnerability_id |
VCID-tf2e-bgq5-9ff5 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93849 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.9387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93879 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93882 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93909 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93915 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.12378 |
| scoring_system |
epss |
| scoring_elements |
0.93916 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5611 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5611
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tf2e-bgq5-9ff5 |
|
| 272 |
| url |
VCID-tf2u-dse2-mufb |
| vulnerability_id |
VCID-tf2u-dse2-mufb |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6814 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.8516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85068 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85103 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85124 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85131 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85146 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85143 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.8514 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02424 |
| scoring_system |
epss |
| scoring_elements |
0.85162 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6814 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6814
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tf2u-dse2-mufb |
|
| 273 |
| url |
VCID-tffx-7mmd-gkcf |
| vulnerability_id |
VCID-tffx-7mmd-gkcf |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94794 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94745 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94754 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94758 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94768 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94776 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.9478 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94781 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94789 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.16023 |
| scoring_system |
epss |
| scoring_elements |
0.94792 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28038 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28038
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tffx-7mmd-gkcf |
|
| 274 |
| url |
VCID-tgfm-2c63-d7dk |
| vulnerability_id |
VCID-tgfm-2c63-d7dk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4049 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90536 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.9054 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90551 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.9057 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90576 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90585 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90597 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.05886 |
| scoring_system |
epss |
| scoring_elements |
0.90594 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4049 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4049
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tgfm-2c63-d7dk |
|
| 275 |
| url |
VCID-tr8v-5ee5-aqfp |
| vulnerability_id |
VCID-tr8v-5ee5-aqfp |
| summary |
The map_meta_cap function in wp-includes/capabilities.php in WordPress 3.4.x before 3.4.2, when the multisite feature is enabled, does not properly assign the unfiltered_html capability, which allows remote authenticated users to bypass intended access restrictions and conduct cross-site scripting (XSS) attacks by leveraging the Administrator or Editor role and composing crafted text. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36022 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.3608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36129 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36117 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36091 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36132 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36118 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36065 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3383 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3383
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tr8v-5ee5-aqfp |
|
| 276 |
| url |
VCID-trn4-a55k-sqad |
| vulnerability_id |
VCID-trn4-a55k-sqad |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79806 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79725 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79754 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.7974 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79797 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79781 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79774 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01307 |
| scoring_system |
epss |
| scoring_elements |
0.79803 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5490 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5490
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-trn4-a55k-sqad |
|
| 277 |
| url |
VCID-ttaw-fpb8-27hp |
| vulnerability_id |
VCID-ttaw-fpb8-27hp |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87548 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.8755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87479 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87489 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87503 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87524 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87538 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87534 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.03465 |
| scoring_system |
epss |
| scoring_elements |
0.87549 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2221 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2221
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ttaw-fpb8-27hp |
|
| 278 |
| url |
VCID-tugh-42tp-8udr |
| vulnerability_id |
VCID-tugh-42tp-8udr |
| summary |
Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 allows remote attackers to inject arbitrary web script or HTML via the user_login parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57869 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58003 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58005 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57999 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58009 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58007 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57985 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5106 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5106
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tugh-42tp-8udr |
|
| 279 |
| url |
VCID-u1fw-ahar-8uc1 |
| vulnerability_id |
VCID-u1fw-ahar-8uc1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4047 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90242 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90258 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90262 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90277 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90292 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90286 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90302 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.05566 |
| scoring_system |
epss |
| scoring_elements |
0.90299 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4047 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4047
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u1fw-ahar-8uc1 |
|
| 280 |
| url |
VCID-u4ef-4sne-tbeg |
| vulnerability_id |
VCID-u4ef-4sne-tbeg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90458 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90463 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90474 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.9048 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90505 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90499 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90516 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.05788 |
| scoring_system |
epss |
| scoring_elements |
0.90514 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20147 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20147
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4ef-4sne-tbeg |
|
| 281 |
| url |
VCID-u93v-9mz6-cubm |
| vulnerability_id |
VCID-u93v-9mz6-cubm |
| summary |
wordpress: XML-RPC interface vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91298 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91302 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.9132 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91332 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.91372 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.06837 |
| scoring_system |
epss |
| scoring_elements |
0.9137 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0664 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0664
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u93v-9mz6-cubm |
|
| 282 |
| url |
VCID-ufsd-zp75-u3h7 |
| vulnerability_id |
VCID-ufsd-zp75-u3h7 |
| summary |
wp-admin/press-this.php in WordPress before 3.0.6 does not enforce the publish_posts capability requirement, which allows remote authenticated users to perform publish actions by leveraging the Contributor role. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-5270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66162 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6623 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66247 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6626 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66281 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66268 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66271 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66287 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-5270 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-5270
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ufsd-zp75-u3h7 |
|
| 283 |
| url |
VCID-uja6-g5w2-1qd2 |
| vulnerability_id |
VCID-uja6-g5w2-1qd2 |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.7109 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.70985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.70996 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71014 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.70988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71031 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71046 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71069 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71054 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71036 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00658 |
| scoring_system |
epss |
| scoring_elements |
0.71082 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2204
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uja6-g5w2-1qd2 |
|
| 284 |
| url |
VCID-ujms-xfg5-77e8 |
| vulnerability_id |
VCID-ujms-xfg5-77e8 |
| summary |
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6896 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97006 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97018 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97019 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97029 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97032 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97043 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.35182 |
| scoring_system |
epss |
| scoring_elements |
0.97051 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6896 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6896
|
| risk_score |
0.6 |
| exploitability |
2.0 |
| weighted_severity |
0.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ujms-xfg5-77e8 |
|
| 285 |
| url |
VCID-uwyj-2kgc-zyg6 |
| vulnerability_id |
VCID-uwyj-2kgc-zyg6 |
| summary |
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92308 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92316 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92328 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92332 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92339 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92348 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.08419 |
| scoring_system |
epss |
| scoring_elements |
0.92347 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22622 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22622
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uwyj-2kgc-zyg6 |
|
| 286 |
| url |
VCID-uymd-e4m2-muem |
| vulnerability_id |
VCID-uymd-e4m2-muem |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2431 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78748 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78755 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78769 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78794 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78825 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78799 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78827 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78822 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2431 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2431
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uymd-e4m2-muem |
|
| 287 |
| url |
VCID-uzm6-mwhv-xfbj |
| vulnerability_id |
VCID-uzm6-mwhv-xfbj |
| summary |
Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4208 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96352 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96359 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96363 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96376 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96383 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.27172 |
| scoring_system |
epss |
| scoring_elements |
0.96399 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4208 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4208
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uzm6-mwhv-xfbj |
|
| 288 |
| url |
VCID-v2xf-n28d-kfcx |
| vulnerability_id |
VCID-v2xf-n28d-kfcx |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12895 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99532 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99531 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99523 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99525 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99526 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99527 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.99528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.89023 |
| scoring_system |
epss |
| scoring_elements |
0.9953 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12895 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12895
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v2xf-n28d-kfcx |
|
| 289 |
| url |
VCID-v5s7-vwe3-5bak |
| vulnerability_id |
VCID-v5s7-vwe3-5bak |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11029 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85684 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85697 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85715 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85721 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.8574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85751 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85763 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85759 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85782 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85775 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11029 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11029
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v5s7-vwe3-5bak |
|
| 290 |
| url |
VCID-v7ph-mtd1-y3e1 |
| vulnerability_id |
VCID-v7ph-mtd1-y3e1 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43500 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.7748 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77452 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77449 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77489 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77487 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77401 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77407 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77437 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01042 |
| scoring_system |
epss |
| scoring_elements |
0.77446 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43500 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://wordpress.org/download/ |
| reference_id |
download |
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:06:13Z/ |
|
|
| url |
https://wordpress.org/download/ |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43500
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ph-mtd1-y3e1 |
|
| 291 |
| url |
VCID-v8by-vn2q-r7gx |
| vulnerability_id |
VCID-v8by-vn2q-r7gx |
| summary |
wp-admin/async-upload.php in the media uploader in WordPress before 3.0.5 allows remote authenticated users to read (1) draft posts or (2) private posts via a modified attachment_id parameter. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0701 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81476 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.8137 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81379 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81402 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.814 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81434 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81456 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81443 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81436 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81473 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01555 |
| scoring_system |
epss |
| scoring_elements |
0.81474 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0701 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0701
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v8by-vn2q-r7gx |
|
| 292 |
| url |
VCID-vchz-vuh2-cfd9 |
| vulnerability_id |
VCID-vchz-vuh2-cfd9 |
| summary |
Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87198 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.8714 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87156 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87173 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87181 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87188 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87184 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87199 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03283 |
| scoring_system |
epss |
| scoring_elements |
0.87204 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1622 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1622
|
| risk_score |
7.8 |
| exploitability |
2.0 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vchz-vuh2-cfd9 |
|
| 293 |
| url |
VCID-vg54-wjcw-fuh4 |
| vulnerability_id |
VCID-vg54-wjcw-fuh4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5610 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.74973 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.74976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75005 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.74981 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75027 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75048 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75017 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75053 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.75061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0086 |
| scoring_system |
epss |
| scoring_elements |
0.7505 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5610 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5610
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vg54-wjcw-fuh4 |
|
| 294 |
| url |
VCID-vhnc-k9yw-cuar |
| vulnerability_id |
VCID-vhnc-k9yw-cuar |
| summary |
wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5293 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59697 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.5977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59795 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59764 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59829 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59849 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59833 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59852 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59859 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59842 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-5293 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-5293
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vhnc-k9yw-cuar |
|
| 295 |
| url |
VCID-vj6y-1qup-jubg |
| vulnerability_id |
VCID-vj6y-1qup-jubg |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82138 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82038 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82049 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82071 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82066 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82093 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.821 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82119 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.8211 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82102 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01668 |
| scoring_system |
epss |
| scoring_elements |
0.82137 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5493 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5493
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vj6y-1qup-jubg |
|
| 296 |
| url |
VCID-vn8w-n4v7-kkfd |
| vulnerability_id |
VCID-vn8w-n4v7-kkfd |
| summary |
WordPress 2.0.11 and earlier allows remote attackers to obtain sensitive information via an empty value of the page parameter to certain PHP scripts under wp-admin/, which reveals the path in various error messages. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.84962 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.84976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.84993 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.84998 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.8502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85043 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85059 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.02394 |
| scoring_system |
epss |
| scoring_elements |
0.85061 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0195 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-0195
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vn8w-n4v7-kkfd |
|
| 297 |
| url |
VCID-vr2c-p6jy-3bb9 |
| vulnerability_id |
VCID-vr2c-p6jy-3bb9 |
| summary |
several |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2205 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69216 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69123 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69139 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.6916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.6921 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69232 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69218 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69189 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69229 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0059 |
| scoring_system |
epss |
| scoring_elements |
0.69237 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2205 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2205
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vr2c-p6jy-3bb9 |
|
| 298 |
| url |
VCID-vs2q-hgzx-jkgk |
| vulnerability_id |
VCID-vs2q-hgzx-jkgk |
| summary |
Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4956 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73836 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73846 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73842 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73877 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.7389 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73912 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73894 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73886 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73928 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73936 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4956 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4956
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2q-hgzx-jkgk |
|
| 299 |
| url |
VCID-vvb8-5w2s-euc2 |
| vulnerability_id |
VCID-vvb8-5w2s-euc2 |
| summary |
several |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73174 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73077 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73118 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73131 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73156 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.7313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73173 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73182 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2201 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2201
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vvb8-5w2s-euc2 |
|
| 300 |
| url |
VCID-vyw2-2d41-6fhh |
| vulnerability_id |
VCID-vyw2-2d41-6fhh |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79908 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79915 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79936 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79924 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79953 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79962 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79982 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79965 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79956 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79985 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01332 |
| scoring_system |
epss |
| scoring_elements |
0.79988 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1559 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1559
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vyw2-2d41-6fhh |
|
| 301 |
| url |
VCID-vywc-p4tw-8yd2 |
| vulnerability_id |
VCID-vywc-p4tw-8yd2 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6815 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.91042 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.90968 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.90973 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.90983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.90993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.91005 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.91011 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.91019 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06385 |
| scoring_system |
epss |
| scoring_elements |
0.91044 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6815 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6815
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vywc-p4tw-8yd2 |
|
| 302 |
| url |
VCID-w7r4-c8yh-hkbc |
| vulnerability_id |
VCID-w7r4-c8yh-hkbc |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87193 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87219 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87216 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87243 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87256 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.8725 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87261 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87265 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03308 |
| scoring_system |
epss |
| scoring_elements |
0.87259 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9061 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9061
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w7r4-c8yh-hkbc |
|
| 303 |
| url |
VCID-w8w1-e5zu-ffgx |
| vulnerability_id |
VCID-w8w1-e5zu-ffgx |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11026 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.88962 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.8897 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.88986 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.88989 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89007 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89012 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89024 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89019 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89017 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.8903 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0441 |
| scoring_system |
epss |
| scoring_elements |
0.89029 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11026 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11026
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w8w1-e5zu-ffgx |
|
| 304 |
| url |
VCID-wenb-bpws-mkar |
| vulnerability_id |
VCID-wenb-bpws-mkar |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11028 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76293 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76296 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76327 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76306 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76339 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76352 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76379 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76357 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76392 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76383 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11028 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11028
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wenb-bpws-mkar |
|
| 305 |
| url |
VCID-wsez-144m-hkd4 |
| vulnerability_id |
VCID-wsez-144m-hkd4 |
| summary |
Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 and 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the user_email parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5105 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82112 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82147 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82144 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.8217 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82177 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82196 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82188 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82218 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.8222 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5105 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-5105
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wsez-144m-hkd4 |
|
| 306 |
| url |
VCID-wtuc-n99m-fyby |
| vulnerability_id |
VCID-wtuc-n99m-fyby |
| summary |
xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1893 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40678 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40762 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40763 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.4077 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40736 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40781 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40751 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1893 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-1893
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wtuc-n99m-fyby |
|
| 307 |
| url |
VCID-wzb1-au3p-uuas |
| vulnerability_id |
VCID-wzb1-au3p-uuas |
| summary |
Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79216 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79143 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.7916 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79185 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79193 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79217 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79202 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79219 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3544
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wzb1-au3p-uuas |
|
| 308 |
| url |
VCID-x5g3-2yvt-xkfm |
| vulnerability_id |
VCID-x5g3-2yvt-xkfm |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9062 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82072 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82084 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82105 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82101 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82153 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82145 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82138 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82176 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82179 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9062 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9062
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x5g3-2yvt-xkfm |
|
| 309 |
| url |
VCID-x733-wwnx-c7fv |
| vulnerability_id |
VCID-x733-wwnx-c7fv |
| summary |
WordPress version <4.9 contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time. This issue appears to have been partially, but not completely fixed in WordPress 4.9 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000600 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95412 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95421 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.9544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95445 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95444 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95446 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95455 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95459 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.19822 |
| scoring_system |
epss |
| scoring_elements |
0.95463 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000600 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000600
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x733-wwnx-c7fv |
|
| 310 |
| url |
VCID-x7aj-4qxd-rkcu |
| vulnerability_id |
VCID-x7aj-4qxd-rkcu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14726 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90529 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90531 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90471 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90475 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90486 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90492 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90505 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90511 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.9052 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90519 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.05803 |
| scoring_system |
epss |
| scoring_elements |
0.90513 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14726 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14726
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x7aj-4qxd-rkcu |
|
| 311 |
| url |
VCID-x89y-av45-ufgh |
| vulnerability_id |
VCID-x89y-av45-ufgh |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66765 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66804 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66828 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6685 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66884 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66838 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66871 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66868 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0165 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0165
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x89y-av45-ufgh |
|
| 312 |
| url |
VCID-x8zt-cvau-xbeb |
| vulnerability_id |
VCID-x8zt-cvau-xbeb |
| summary |
A flaw in WordPress allows registered WordPress users to elevate
privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4028 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90266 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90268 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90282 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90301 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90308 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90316 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90315 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.9031 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05593 |
| scoring_system |
epss |
| scoring_elements |
0.90323 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4028 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4028
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8zt-cvau-xbeb |
|
| 313 |
| url |
VCID-xd4w-ak3v-dybq |
| vulnerability_id |
VCID-xd4w-ak3v-dybq |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91272 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91287 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91293 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91306 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91312 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91319 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91321 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.9132 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91345 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.06796 |
| scoring_system |
epss |
| scoring_elements |
0.91344 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20151 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20151
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xd4w-ak3v-dybq |
|
| 314 |
| url |
VCID-xezj-tz9b-t7d3 |
| vulnerability_id |
VCID-xezj-tz9b-t7d3 |
| summary |
WordPress contains HTTP response splitting and cross-site scripting
vulnerabilities. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1584 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94736 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94746 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94749 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.9475 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.9476 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94768 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94771 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94772 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94779 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94782 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.16 |
| scoring_system |
epss |
| scoring_elements |
0.94785 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1584 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1584
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xezj-tz9b-t7d3 |
|
| 315 |
| url |
VCID-xfxs-pjex-3bh3 |
| vulnerability_id |
VCID-xfxs-pjex-3bh3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39999 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75587 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75598 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75604 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75635 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75639 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00895 |
| scoring_system |
epss |
| scoring_elements |
0.75624 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39999 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39999
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xfxs-pjex-3bh3 |
|
| 316 |
| url |
VCID-xg1e-yjwb-r3h4 |
| vulnerability_id |
VCID-xg1e-yjwb-r3h4 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5714 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.9673 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96727 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96685 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96697 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96711 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96714 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96717 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.30646 |
| scoring_system |
epss |
| scoring_elements |
0.96723 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5714 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5714
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xg1e-yjwb-r3h4 |
|
| 317 |
| url |
VCID-xj9y-sb3e-vkac |
| vulnerability_id |
VCID-xj9y-sb3e-vkac |
| summary |
WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0540 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91962 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91917 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91925 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91944 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.9195 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91953 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91952 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91948 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91968 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0776 |
| scoring_system |
epss |
| scoring_elements |
0.91965 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0540 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0540
|
| risk_score |
9.0 |
| exploitability |
2.0 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xj9y-sb3e-vkac |
|
| 318 |
| url |
VCID-xsz3-bme6-ubfn |
| vulnerability_id |
VCID-xsz3-bme6-ubfn |
| summary |
WordPress: XSS via unescaped HTML URLs as author comments in the admin page |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2851 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86506 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86525 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86535 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.8655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86547 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86556 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86554 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2851 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2851
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xsz3-bme6-ubfn |
|
| 319 |
| url |
VCID-xwgs-bt6t-qfbh |
| vulnerability_id |
VCID-xwgs-bt6t-qfbh |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.9772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97727 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97728 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97737 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97739 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97741 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97743 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.48368 |
| scoring_system |
epss |
| scoring_elements |
0.97751 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5623 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5623
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xwgs-bt6t-qfbh |
|
| 320 |
| url |
VCID-xzu6-fn31-43ej |
| vulnerability_id |
VCID-xzu6-fn31-43ej |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21662 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94363 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94374 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94384 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94392 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94393 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94408 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.14241 |
| scoring_system |
epss |
| scoring_elements |
0.94416 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21662 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21662
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xzu6-fn31-43ej |
|
| 321 |
| url |
VCID-y1em-tppz-7qew |
| vulnerability_id |
VCID-y1em-tppz-7qew |
| summary |
Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88258 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88187 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88211 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88217 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88242 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88254 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88246 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.8826 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03881 |
| scoring_system |
epss |
| scoring_elements |
0.88259 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4536 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-4536
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y1em-tppz-7qew |
|
| 322 |
| url |
VCID-y2jb-7zbk-27cg |
| vulnerability_id |
VCID-y2jb-7zbk-27cg |
| summary |
Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3414 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90939 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90866 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.9088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90891 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90903 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90909 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90918 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90917 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.06259 |
| scoring_system |
epss |
| scoring_elements |
0.90941 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3414 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3414
|
| risk_score |
7.8 |
| exploitability |
2.0 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y2jb-7zbk-27cg |
|
| 323 |
| url |
VCID-y72f-vtf2-2fat |
| vulnerability_id |
VCID-y72f-vtf2-2fat |
| summary |
wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98825 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98828 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.9883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98831 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98833 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.9884 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.74127 |
| scoring_system |
epss |
| scoring_elements |
0.98845 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2762 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2762
|
| risk_score |
1.4 |
| exploitability |
2.0 |
| weighted_severity |
0.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y72f-vtf2-2fat |
|
| 324 |
| url |
VCID-yees-gysw-d3cx |
| vulnerability_id |
VCID-yees-gysw-d3cx |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5839 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.7828 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78283 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78236 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78245 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78276 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78259 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78255 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01122 |
| scoring_system |
epss |
| scoring_elements |
0.78286 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5839 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5839
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yees-gysw-d3cx |
|
| 325 |
| url |
VCID-ymp4-217x-6ub4 |
| vulnerability_id |
VCID-ymp4-217x-6ub4 |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.7769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77697 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77725 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77736 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77767 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.7775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77787 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77785 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77779 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2432 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2432
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymp4-217x-6ub4 |
|
| 326 |
| url |
VCID-yqam-kpce-dfg7 |
| vulnerability_id |
VCID-yqam-kpce-dfg7 |
| summary |
WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96388 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96395 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96399 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96411 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96414 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96419 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.9642 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96423 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.9643 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96434 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.27489 |
| scoring_system |
epss |
| scoring_elements |
0.96435 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44223 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44223
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yqam-kpce-dfg7 |
|
| 327 |
| url |
VCID-yqyp-a879-nfda |
| vulnerability_id |
VCID-yqyp-a879-nfda |
| summary |
WordPress is vulnerable to SQL injection, information disclosure, and
cross-site scripting attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0107 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91447 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91377 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91393 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91401 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91413 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.9142 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91426 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91428 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91427 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91451 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.06942 |
| scoring_system |
epss |
| scoring_elements |
0.91446 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-0107 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-0107
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yqyp-a879-nfda |
|
| 328 |
| url |
VCID-ys9t-dsgg-zbff |
| vulnerability_id |
VCID-ys9t-dsgg-zbff |
| summary |
Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3891 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77378 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77411 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77391 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77431 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77456 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77472 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.7747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01041 |
| scoring_system |
epss |
| scoring_elements |
0.77462 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3891 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3891
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ys9t-dsgg-zbff |
|
| 329 |
| url |
VCID-ysde-2c1f-r3a3 |
| vulnerability_id |
VCID-ysde-2c1f-r3a3 |
| summary |
wp-includes/vars.php in Wordpress before 2.2.3 does not properly extract the current path from the PATH_INFO ($PHP_SELF), which allows remote attackers to bypass intended access restrictions for certain pages. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2146 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68927 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68947 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68977 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68996 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69019 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68975 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69006 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2146 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-2146
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ysde-2c1f-r3a3 |
|
| 330 |
| url |
VCID-z4g5-m3kv-93e3 |
| vulnerability_id |
VCID-z4g5-m3kv-93e3 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9063 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80707 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80738 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80734 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80762 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.8077 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80771 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.808 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80803 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01449 |
| scoring_system |
epss |
| scoring_elements |
0.80804 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9063 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9063
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z4g5-m3kv-93e3 |
|
| 331 |
| url |
VCID-z8gv-sec9-xbam |
| vulnerability_id |
VCID-z8gv-sec9-xbam |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96723 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.9672 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96678 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96688 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.9669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96694 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96702 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96707 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96709 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.30547 |
| scoring_system |
epss |
| scoring_elements |
0.96715 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14722 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14722
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z8gv-sec9-xbam |
|
| 332 |
| url |
VCID-zebg-ku4f-dbgk |
| vulnerability_id |
VCID-zebg-ku4f-dbgk |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3429 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81253 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81284 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81311 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81316 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81337 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81315 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81353 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01531 |
| scoring_system |
epss |
| scoring_elements |
0.81355 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3429 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3429
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zebg-ku4f-dbgk |
|
| 333 |
| url |
VCID-zf8r-75us-nygf |
| vulnerability_id |
VCID-zf8r-75us-nygf |
| summary |
WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06071 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.061 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06083 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06123 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06162 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06153 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07361 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07318 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07308 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07238 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07233 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3906 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3906
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zf8r-75us-nygf |
|
| 334 |
| url |
VCID-zhsu-sye9-mkaz |
| vulnerability_id |
VCID-zhsu-sye9-mkaz |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9064 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79335 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79342 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79351 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79378 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79387 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.7941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79383 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79415 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01257 |
| scoring_system |
epss |
| scoring_elements |
0.79416 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9064 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9064
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zhsu-sye9-mkaz |
|
| 335 |
| url |
VCID-zj9a-shru-e7gs |
| vulnerability_id |
VCID-zj9a-shru-e7gs |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07411 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07516 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0749 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07436 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07493 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08189 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58674 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58674
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zj9a-shru-e7gs |
|
| 336 |
| url |
VCID-zmhc-4gku-13ga |
| vulnerability_id |
VCID-zmhc-4gku-13ga |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28037 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.9402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93961 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.9397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93979 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93982 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93991 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93994 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93999 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.93998 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.94014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.1273 |
| scoring_system |
epss |
| scoring_elements |
0.94019 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28037 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28037
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zmhc-4gku-13ga |
|
| 337 |
| url |
VCID-znav-bux7-7qd2 |
| vulnerability_id |
VCID-znav-bux7-7qd2 |
| summary |
wp-admin/includes/class-wp-posts-list-table.php in WordPress before 3.3.3 does not properly restrict excerpt-view access, which allows remote authenticated users to obtain sensitive information by visiting a draft. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71678 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71684 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71713 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71732 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71758 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71764 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00688 |
| scoring_system |
epss |
| scoring_elements |
0.71746 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6635 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6635
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znav-bux7-7qd2 |
|
| 338 |
| url |
VCID-znb5-qcr5-pqaf |
| vulnerability_id |
VCID-znb5-qcr5-pqaf |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20152 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93638 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93649 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93657 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.9366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93668 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.9367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93674 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93675 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93676 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93693 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.937 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.11676 |
| scoring_system |
epss |
| scoring_elements |
0.93702 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20152 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20152
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znb5-qcr5-pqaf |
|
| 339 |
| url |
VCID-ztfv-xfxe-kket |
| vulnerability_id |
VCID-ztfv-xfxe-kket |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99356 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99357 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.9936 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99366 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2335
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ztfv-xfxe-kket |
|
| 340 |
| url |
VCID-zvnm-b6n7-1kbx |
| vulnerability_id |
VCID-zvnm-b6n7-1kbx |
| summary |
wp-includes/taxonomy.php in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Taxonomy query hardening," possibly involving SQL injection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3130 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66737 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66775 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.668 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66822 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66836 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66856 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66842 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.6681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66843 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0052 |
| scoring_system |
epss |
| scoring_elements |
0.66841 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3130 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3130
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zvnm-b6n7-1kbx |
|
| 341 |
| url |
VCID-zwpk-86cs-tqaz |
| vulnerability_id |
VCID-zwpk-86cs-tqaz |
| summary |
Wordpress contains SQL injection and XSS vulnerabilities. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1810 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81967 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81863 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81897 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81893 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.8192 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81946 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81934 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81929 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01638 |
| scoring_system |
epss |
| scoring_elements |
0.81965 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-1810 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-1810
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zwpk-86cs-tqaz |
|
| 342 |
| url |
VCID-zyqs-75ad-8kcd |
| vulnerability_id |
VCID-zyqs-75ad-8kcd |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86623 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86544 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86554 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86573 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86592 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86616 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86605 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03015 |
| scoring_system |
epss |
| scoring_elements |
0.86619 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7169 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7169
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zyqs-75ad-8kcd |
|
| 343 |
| url |
VCID-zzcw-snrs-kygh |
| vulnerability_id |
VCID-zzcw-snrs-kygh |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5731 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94517 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94459 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94466 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94474 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94475 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94489 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94508 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.14757 |
| scoring_system |
epss |
| scoring_elements |
0.94512 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5731 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5731
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zzcw-snrs-kygh |
|