Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-tmb8-vc5k-tbbc |
| Summary | Security researcher Juho Nurminen reported a mechanism to spoof the
URL displayed in the addressbar in reader mode by manipulating the loaded URL. This flaw
allows for the URL displayed to be different than that the web content rendered. This
allows for potential spoofing but the effects are mitigated due to the restrictions reader
mode places when rendering content. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71996 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71911 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71882 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71921 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71932 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71956 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71967 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71952 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4508 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
120 |
| name |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| description |
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. |
|
|
| Exploits |
|
| Severity_range_score | 0.1 - 3 |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb8-vc5k-tbbc |