| 0 |
| url |
VCID-4cs6-n1vc-13cd |
| vulnerability_id |
VCID-4cs6-n1vc-13cd |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2336 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84671 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84706 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.8473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84737 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84768 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02303 |
| scoring_system |
epss |
| scoring_elements |
0.84793 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2336 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2336
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4cs6-n1vc-13cd |
|
| 1 |
| url |
VCID-7wx9-apzc-qqar |
| vulnerability_id |
VCID-7wx9-apzc-qqar |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93825 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93844 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93847 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93859 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93864 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93892 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93893 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.12303 |
| scoring_system |
epss |
| scoring_elements |
0.93895 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2334
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wx9-apzc-qqar |
|
| 2 |
| url |
VCID-8n5j-65xk-wqbp |
| vulnerability_id |
VCID-8n5j-65xk-wqbp |
| summary |
Wordpress before 2.8.3 does not check capabilities for certain actions, which allows remote attackers to make unauthorized edits or additions via a direct request to (1) edit-comments.php, (2) edit-pages.php, (3) edit.php, (4) edit-category-form.php, (5) edit-link-category-form.php, (6) edit-tag-form.php, (7) export.php, (8) import.php, or (9) link-add.php in wp-admin/. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80499 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80517 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80547 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80561 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80581 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80583 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80586 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01415 |
| scoring_system |
epss |
| scoring_elements |
0.80612 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2854 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2854
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8n5j-65xk-wqbp |
|
| 3 |
| url |
VCID-ajbz-j6qz-vua9 |
| vulnerability_id |
VCID-ajbz-j6qz-vua9 |
| summary |
Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) edit-link-category-form.php, (6) edit-link-form.php, (7) edit-page-form.php, and (8) edit-tag-form.php in wp-admin/. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78843 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.7889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78944 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2853 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2853
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajbz-j6qz-vua9 |
|
| 4 |
| url |
VCID-b4h4-1gys-uqcc |
| vulnerability_id |
VCID-b4h4-1gys-uqcc |
| summary |
wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72855 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72863 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72909 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72952 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72962 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0074 |
| scoring_system |
epss |
| scoring_elements |
0.72996 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-6767
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4h4-1gys-uqcc |
|
| 5 |
| url |
VCID-qj5d-cu2t-efah |
| vulnerability_id |
VCID-qj5d-cu2t-efah |
| summary |
Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52108 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52152 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52179 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52143 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52197 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52193 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52244 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52228 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52214 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52256 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52239 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52187 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-6762 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-6762
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qj5d-cu2t-efah |
|
| 6 |
| url |
VCID-uymd-e4m2-muem |
| vulnerability_id |
VCID-uymd-e4m2-muem |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2431 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78748 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78755 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78769 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78794 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78825 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78799 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78827 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.78822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01187 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2431 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2431
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uymd-e4m2-muem |
|
| 7 |
| url |
VCID-xsz3-bme6-ubfn |
| vulnerability_id |
VCID-xsz3-bme6-ubfn |
| summary |
WordPress: XSS via unescaped HTML URLs as author comments in the admin page |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2851 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86506 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86525 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86535 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.8655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86547 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86556 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86554 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.02987 |
| scoring_system |
epss |
| scoring_elements |
0.86573 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2851 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2851
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xsz3-bme6-ubfn |
|
| 8 |
| url |
VCID-ymp4-217x-6ub4 |
| vulnerability_id |
VCID-ymp4-217x-6ub4 |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.7769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77697 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77725 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77736 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77767 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.7775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77787 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77785 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77779 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01072 |
| scoring_system |
epss |
| scoring_elements |
0.77811 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2432 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2432
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymp4-217x-6ub4 |
|
| 9 |
| url |
VCID-ztfv-xfxe-kket |
| vulnerability_id |
VCID-ztfv-xfxe-kket |
| summary |
wordpress: multiple vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99356 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99357 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.9936 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99366 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.85338 |
| scoring_system |
epss |
| scoring_elements |
0.99369 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2335
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ztfv-xfxe-kket |
|