| 0 |
| url |
VCID-18aq-72zg-3uc9 |
| vulnerability_id |
VCID-18aq-72zg-3uc9 |
| summary |
puppet: Unsafe YAML deserialization |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2295 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.8313 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83197 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83201 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83161 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83159 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01893 |
| scoring_system |
epss |
| scoring_elements |
0.83191 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2295 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2295
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-18aq-72zg-3uc9 |
|
| 1 |
| url |
VCID-1fgf-s31g-pfac |
| vulnerability_id |
VCID-1fgf-s31g-pfac |
| summary |
foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36001 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36066 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36027 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36151 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36036 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36059 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8183 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8183
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1fgf-s31g-pfac |
|
| 2 |
| url |
VCID-1hff-pbpa-p3e5 |
| vulnerability_id |
VCID-1hff-pbpa-p3e5 |
| summary |
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
### Impact
If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection.
Upon seeing a newline in the header, rails will silently create a new `Content-Security-Policy` header with the remaining value of the original string. It will continue to create new headers for each newline.
e.g.
```ruby
override_content_security_directives(script_src: ['mycdn.com', "\ninjected\n"])`
```
would result in
```
Content-Security-Policy: ... script-src: mycdn.com
Content-Security-Policy: injected
Content-Security-Policy: rest-of-the-header
```
CSP supports multiple headers and all policies must be satisfied for execution to occur, but a malicious value that reports the current page is fairly trivial:
```ruby
override_content_security_directives(script_src: ["mycdn.com", "\ndefault-src 'none'; report-uri evil.com"])
```
```
Content-Security-Policy: ... script-src: mycdn.com
Content-Security-Policy: default-src 'none'; report-uri evil.com
Content-Security-Policy: rest-of-the-header
```
### Patches
This has been fixed in 6.3.0, 5.2.0, and 3.9.0
### Workarounds
```ruby
override_content_security_policy_directives(:frame_src, [user_input.gsub("\n", " ")])
```
### References
https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c
[The effect of multiple policies](https://www.w3.org/TR/CSP3/#multiple-policies)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repo](https://github.com/twitter/secure_headers/security/advisories/new)
* DM us at @ndm on twitter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5216 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57287 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57327 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57314 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57261 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.57179 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00347 |
| scoring_system |
epss |
| scoring_elements |
0.5726 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5216 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5216, GHSA-w978-rmpf-qmwg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1hff-pbpa-p3e5 |
|
| 3 |
| url |
VCID-1mw1-384y-huc7 |
| vulnerability_id |
VCID-1mw1-384y-huc7 |
| summary |
Uncontrolled Resource Consumption
Algorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2099 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89929 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.8997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05238 |
| scoring_system |
epss |
| scoring_elements |
0.89969 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2099 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2099
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1mw1-384y-huc7 |
|
| 4 |
| url |
VCID-1xgz-hwng-n3eq |
| vulnerability_id |
VCID-1xgz-hwng-n3eq |
| summary |
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already run.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71509 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71532 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.7158 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71564 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8185, GHSA-c6qr-h5vq-59jc
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xgz-hwng-n3eq |
|
| 5 |
| url |
VCID-27wt-wmzc-1bc2 |
| vulnerability_id |
VCID-27wt-wmzc-1bc2 |
| summary |
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76383 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.7641 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76384 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76371 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76327 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00952 |
| scoring_system |
epss |
| scoring_elements |
0.76324 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6188 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://usn.ubuntu.com/3559-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/3559-1 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-6188, GHSA-rf4j-j272-fj86, PYSEC-2018-4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-27wt-wmzc-1bc2 |
|
| 6 |
| url |
VCID-2g54-3acq-pbha |
| vulnerability_id |
VCID-2g54-3acq-pbha |
| summary |
rubygem-foreman_ansible: "User input" entry from Job Invocation may contain sensitive data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10716 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36361 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36535 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36406 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36478 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36428 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10716 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10716
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2g54-3acq-pbha |
|
| 7 |
| url |
VCID-2y5d-qg7z-2kdg |
| vulnerability_id |
VCID-2y5d-qg7z-2kdg |
| summary |
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93086 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93073 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93102 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93103 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.931 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93085 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93093 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.10144 |
| scoring_system |
epss |
| scoring_elements |
0.93098 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5929 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5929, GHSA-vmfg-rjjm-rjrj
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2y5d-qg7z-2kdg |
|
| 8 |
| url |
VCID-31h9-7jrr-9kdt |
| vulnerability_id |
VCID-31h9-7jrr-9kdt |
| summary |
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60573 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60558 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60436 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60512 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60538 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60508 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00397 |
| scoring_system |
epss |
| scoring_elements |
0.60557 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000340 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000340 |
| reference_id |
CVE-2016-1000340 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000340 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000340, GHSA-r97x-3g8f-gx3m
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-31h9-7jrr-9kdt |
|
| 9 |
| url |
VCID-31xv-z8c6-a7bg |
| vulnerability_id |
VCID-31xv-z8c6-a7bg |
| summary |
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks.
### Impact
When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples:
```erb
<%# The welcome_html translation is not defined for the current locale: %>
<%= t("welcome_html", default: untrusted_user_controlled_string) %>
<%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %>
<%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %>
```
### Patches
Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations.
The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest.
To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series
* [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series
Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases.
### Workarounds
Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`):
```erb
<%= t("welcome_html", default: h(untrusted_user_controlled_string)) %>
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81123 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81136 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81112 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81085 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81061 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81052 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-15169, GHSA-cfjv-5498-mph5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-31xv-z8c6-a7bg |
|
| 10 |
| url |
VCID-3af2-c1m7-3kdr |
| vulnerability_id |
VCID-3af2-c1m7-3kdr |
| summary |
foreman: authorization bypasses in foreman-tasks leading to information disclosure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10198 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80547 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80554 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80576 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80568 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80597 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80606 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80624 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01423 |
| scoring_system |
epss |
| scoring_elements |
0.80602 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10198 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10198
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3af2-c1m7-3kdr |
|
| 11 |
| url |
VCID-3j8j-qks5-m3ew |
| vulnerability_id |
VCID-3j8j-qks5-m3ew |
| summary |
foreman: privilege escalation through Organization and Locations API |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34243 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34583 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.3461 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34477 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.3452 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34549 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34551 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34512 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34488 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4451 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4451
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3j8j-qks5-m3ew |
|
| 12 |
| url |
VCID-3t8t-yt9b-1fce |
| vulnerability_id |
VCID-3t8t-yt9b-1fce |
| summary |
Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54554 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5453 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54455 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61371 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61321 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61368 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61384 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61405 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.6139 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10516 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-10516 |
| reference_id |
CVE-2016-10516 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-10516 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-10516, GHSA-h2fp-xgx6-xh6f, PYSEC-2017-43
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3t8t-yt9b-1fce |
|
| 13 |
| url |
VCID-3wa1-khqf-x7fv |
| vulnerability_id |
VCID-3wa1-khqf-x7fv |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04028 |
| scoring_system |
epss |
| scoring_elements |
0.88441 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.04028 |
| scoring_system |
epss |
| scoring_elements |
0.88433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04028 |
| scoring_system |
epss |
| scoring_elements |
0.88456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89836 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89843 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89845 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.05104 |
| scoring_system |
epss |
| scoring_elements |
0.89815 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10968 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10968, GHSA-rf6r-2c4q-2vwg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3wa1-khqf-x7fv |
|
| 14 |
| url |
VCID-3ycr-9smk-uqdc |
| vulnerability_id |
VCID-3ycr-9smk-uqdc |
| summary |
Potential Denial of Service Vulnerability
Carefully crafted requests can cause a `SystemStackError` and potentially cause a denial of service attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93234 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.9322 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93218 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93232 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.10456 |
| scoring_system |
epss |
| scoring_elements |
0.93207 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3225 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3225, GHSA-rgr4-9jh5-j4j6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ycr-9smk-uqdc |
|
| 15 |
| url |
VCID-3zeq-dyj1-8bdm |
| vulnerability_id |
VCID-3zeq-dyj1-8bdm |
| summary |
foreman: Ovirt admin password exposed by foreman API |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1097 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58708 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58804 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58772 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58824 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58831 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58849 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58812 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1097 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1097
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zeq-dyj1-8bdm |
|
| 16 |
| url |
VCID-4d6e-mx3k-yqgk |
| vulnerability_id |
VCID-4d6e-mx3k-yqgk |
| summary |
foreman: Information leak through organizations and locations feature |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7078 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54559 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54671 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54684 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54667 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00316 |
| scoring_system |
epss |
| scoring_elements |
0.54646 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7078 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7078
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4d6e-mx3k-yqgk |
|
| 17 |
| url |
VCID-5434-f6g7-8kdw |
| vulnerability_id |
VCID-5434-f6g7-8kdw |
| summary |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2015-3208, GHSA-x6rc-54xp-ccxx
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5434-f6g7-8kdw |
|
| 18 |
| url |
VCID-63rx-372a-ukby |
| vulnerability_id |
VCID-63rx-372a-ukby |
| summary |
Improper Certificate Validation in Puppet
Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7942 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30765 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3081 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30854 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30852 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30821 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30763 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30943 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7942 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7942, GHSA-gqvf-892r-vjm5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63rx-372a-ukby |
|
| 19 |
| url |
VCID-6bhb-kgf4-abe7 |
| vulnerability_id |
VCID-6bhb-kgf4-abe7 |
| summary |
foreman: Stored XSS vulnerability in remote execution plugin |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8613 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72779 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72786 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72806 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72821 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72835 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72859 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72843 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8613 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8613
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6bhb-kgf4-abe7 |
|
| 20 |
| url |
VCID-6fxc-s6ht-x7ht |
| vulnerability_id |
VCID-6fxc-s6ht-x7ht |
| summary |
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77239 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77266 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77246 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77243 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77182 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01022 |
| scoring_system |
epss |
| scoring_elements |
0.77231 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10745 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://github.com/pallets/jinja |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/pallets/jinja |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://usn.ubuntu.com/4011-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4011-1 |
|
| 18 |
|
| 19 |
| reference_url |
https://usn.ubuntu.com/4011-2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4011-2 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-10745 |
| reference_id |
CVE-2016-10745 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 3 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-10745 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-10745, GHSA-hj2j-77xm-mc5v, PYSEC-2019-220
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6fxc-s6ht-x7ht |
|
| 21 |
| url |
VCID-6hub-g2ja-afaw |
| vulnerability_id |
VCID-6hub-g2ja-afaw |
| summary |
Information disclosure vulnerability
safemode for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3693 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72617 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72627 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72645 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72621 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.7257 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72577 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72571 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3693 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3693 |
| reference_id |
CVE-2016-3693 |
| reference_type |
|
| scores |
| 0 |
| value |
6.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3693 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3693, GHSA-c92m-rrrc-q5wf
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6hub-g2ja-afaw |
|
| 22 |
| url |
VCID-6jdw-pp1b-1qan |
| vulnerability_id |
VCID-6jdw-pp1b-1qan |
| summary |
katello-debug: Possible symlink attacks due to use of predictable file names |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9595 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12806 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12904 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12954 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12756 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12836 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1277 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9595 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9595
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6jdw-pp1b-1qan |
|
| 23 |
| url |
VCID-6wxf-ewtr-z3hb |
| vulnerability_id |
VCID-6wxf-ewtr-z3hb |
| summary |
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87518 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87573 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87581 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.8757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.03483 |
| scoring_system |
epss |
| scoring_elements |
0.87528 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10906 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/pallets/jinja |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/pallets/jinja |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
| reference_url |
https://usn.ubuntu.com/4011-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4011-1 |
|
| 39 |
|
| 40 |
| reference_url |
https://usn.ubuntu.com/4011-2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4011-2 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10906 |
| reference_id |
CVE-2019-10906 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
|
| 3 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10906 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10906, GHSA-462w-v97r-4m45, PYSEC-2019-217
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6wxf-ewtr-z3hb |
|
| 24 |
| url |
VCID-6xkf-evrx-pyau |
| vulnerability_id |
VCID-6xkf-evrx-pyau |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50599 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.5056 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50588 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50541 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50596 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50635 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50613 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2166 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2166 |
| reference_id |
CVE-2016-2166 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2166 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2166, GHSA-f5cf-f7px-xpmh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkf-evrx-pyau |
|
| 25 |
| url |
VCID-73c1-6ytd-ykf9 |
| vulnerability_id |
VCID-73c1-6ytd-ykf9 |
| summary |
foreman: SQL injection due to improper handling of the widget id parameter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54516 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54587 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54611 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5458 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54627 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54639 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.546 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1096 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1096
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-73c1-6ytd-ykf9 |
|
| 26 |
| url |
VCID-77c9-jb1m-6qe2 |
| vulnerability_id |
VCID-77c9-jb1m-6qe2 |
| summary |
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94968 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94978 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16987 |
| scoring_system |
epss |
| scoring_elements |
0.94981 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0203
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-77c9-jb1m-6qe2 |
|
| 27 |
| url |
VCID-7v7q-8wa6-hff5 |
| vulnerability_id |
VCID-7v7q-8wa6-hff5 |
| summary |
Improper Access Control
A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-3258 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88634 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88583 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88639 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88638 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88646 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88609 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.04126 |
| scoring_system |
epss |
| scoring_elements |
0.88629 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-3258 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-3258, GHSA-4vrv-ch96-6h42
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7v7q-8wa6-hff5 |
|
| 28 |
| url |
VCID-7zj1-ye9x-cueu |
| vulnerability_id |
VCID-7zj1-ye9x-cueu |
| summary |
pulp: Leakage of CA key in pulp-qpid-ssl-cfg |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16633 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16806 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16648 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16732 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16723 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16666 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3696 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3696
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7zj1-ye9x-cueu |
|
| 29 |
| url |
VCID-895a-ydc5-zfg6 |
| vulnerability_id |
VCID-895a-ydc5-zfg6 |
| summary |
Circumvention of file size limits in ActiveStorage
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user.
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81431 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81405 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81356 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8162 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8162, GHSA-m42x-37p3-fv5w
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-895a-ydc5-zfg6 |
|
| 30 |
| url |
VCID-8fnw-r4f3-xqcg |
| vulnerability_id |
VCID-8fnw-r4f3-xqcg |
| summary |
foreman: Image password leak |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2672 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38794 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38893 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38956 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.3892 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38949 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38879 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00175 |
| scoring_system |
epss |
| scoring_elements |
0.38931 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2672 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2672
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8fnw-r4f3-xqcg |
|
| 31 |
| url |
VCID-8xgm-pabz-hkeg |
| vulnerability_id |
VCID-8xgm-pabz-hkeg |
| summary |
Improper Privilege Management
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10689 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25828 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25819 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2577 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25728 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25786 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2593 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25887 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25827 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10689 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-10689, GHSA-vw22-465p-8j5w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8xgm-pabz-hkeg |
|
| 32 |
| url |
VCID-8zkw-y3yd-yuft |
| vulnerability_id |
VCID-8zkw-y3yd-yuft |
| summary |
Directory traversal in Rack::Directory app bundled with Rack
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8161 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75759 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75765 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75784 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.7576 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75735 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75703 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00907 |
| scoring_system |
epss |
| scoring_elements |
0.75715 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8161 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8161, GHSA-5f9h-9pjv-v6j7
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkw-y3yd-yuft |
|
| 33 |
| url |
VCID-9gb8-xvrc-aqgb |
| vulnerability_id |
VCID-9gb8-xvrc-aqgb |
| summary |
qpid-cpp: anonymous access to qpidd cannot be prevented |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84587 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84601 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84645 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84669 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84664 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02275 |
| scoring_system |
epss |
| scoring_elements |
0.84659 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0223
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9gb8-xvrc-aqgb |
|
| 34 |
| url |
VCID-9qdt-7p83-4yd8 |
| vulnerability_id |
VCID-9qdt-7p83-4yd8 |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77381 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77384 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77405 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77369 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.7733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77323 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01035 |
| scoring_system |
epss |
| scoring_elements |
0.77338 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10969 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10969, GHSA-758m-v56v-grj4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9qdt-7p83-4yd8 |
|
| 35 |
| url |
VCID-9wej-f7zx-pfeq |
| vulnerability_id |
VCID-9wej-f7zx-pfeq |
| summary |
Information exposure in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94654 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94659 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94636 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94628 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.15501 |
| scoring_system |
epss |
| scoring_elements |
0.94642 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12086 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12086, GHSA-5ww9-j83m-q7qx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9wej-f7zx-pfeq |
|
| 36 |
| url |
VCID-a5sk-5grx-eyaf |
| vulnerability_id |
VCID-a5sk-5grx-eyaf |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79947 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79955 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79971 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79951 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79943 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79914 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79899 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.0133 |
| scoring_system |
epss |
| scoring_elements |
0.79905 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-11619 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-11619, GHSA-27xj-rqx5-2255
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a5sk-5grx-eyaf |
|
| 37 |
| url |
VCID-a6sp-18av-wya6 |
| vulnerability_id |
VCID-a6sp-18av-wya6 |
| summary |
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 5.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Applications that use this return value may be
inadvertently use untrusted user input.
Impacted code will look something like this:
```
def update
# Attacker has included the parameter: `{ is_admin: true }`
User.update(clean_up_params)
end
def clean_up_params
params.each { |k, v| SomeModel.check(v) if k == :name }
end
```
Note the mistaken use of `each` in the `clean_up_params` method in the above
example.
Workarounds
-----------
Do not use the return values of `each`, `each_value`, or `each_pair` in your
application. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.9169 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91698 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91724 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91734 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91736 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8164, GHSA-8727-m6gj-mc37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sp-18av-wya6 |
|
| 38 |
| url |
VCID-afkn-k8yk-w3dr |
| vulnerability_id |
VCID-afkn-k8yk-w3dr |
| summary |
Improper Input Validation in Hibernate Validator
A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10693 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5154 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51563 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51584 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5145 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51501 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51489 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51542 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10693 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10693, GHSA-rmrm-75hp-phr2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-afkn-k8yk-w3dr |
|
| 39 |
| url |
VCID-am23-ncy4-27ck |
| vulnerability_id |
VCID-am23-ncy4-27ck |
| summary |
foreman: Stored XSS in fact name or value |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56956 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56979 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56941 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56962 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56938 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56989 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56992 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15100 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15100
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am23-ncy4-27ck |
|
| 40 |
| url |
VCID-asqu-5r9h-9yav |
| vulnerability_id |
VCID-asqu-5r9h-9yav |
| summary |
SQL Injection
An SQL injection was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33529 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33553 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33601 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33567 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33523 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33496 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.3365 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14623 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14623, GHSA-jx5v-788g-qw58
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-asqu-5r9h-9yav |
|
| 41 |
| url |
VCID-avsj-f1g8-yfen |
| vulnerability_id |
VCID-avsj-f1g8-yfen |
| summary |
foreman: Persistent XSS in Foreman remote execution plugin |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72684 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72692 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72711 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72688 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.7274 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72764 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72748 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00734 |
| scoring_system |
epss |
| scoring_elements |
0.72738 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6319 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6319
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-avsj-f1g8-yfen |
|
| 42 |
| url |
VCID-bdms-nb18-guf9 |
| vulnerability_id |
VCID-bdms-nb18-guf9 |
| summary |
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7233 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71725 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71737 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71773 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71739 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71699 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7233 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://github.com/advisories/GHSA-37hp-765x-j95x |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-37hp-765x-j95x |
|
| 15 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7233 |
| reference_id |
CVE-2017-7233 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7233 |
|
| 79 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7233, GHSA-37hp-765x-j95x, PYSEC-2017-9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdms-nb18-guf9 |
|
| 43 |
| url |
VCID-bhq3-j6aj-1yae |
| vulnerability_id |
VCID-bhq3-j6aj-1yae |
| summary |
Insecure Deserialization in Apache Commons Beanutils
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79214 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79184 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79232 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79256 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.7919 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01239 |
| scoring_system |
epss |
| scoring_elements |
0.79229 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10086 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10086, GHSA-6phf-73q6-gh87
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhq3-j6aj-1yae |
|
| 44 |
| url |
VCID-bsbd-bsbq-7qdk |
| vulnerability_id |
VCID-bsbd-bsbq-7qdk |
| summary |
Katello cleartext password storage issue
A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14825 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35956 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35906 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.36073 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.36042 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35947 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35851 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14825 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14825 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
4.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N |
|
| 2 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14825 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14825, GHSA-m4wh-848j-9w2r
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bsbd-bsbq-7qdk |
|
| 45 |
| url |
VCID-bvrv-wvt6-8yfy |
| vulnerability_id |
VCID-bvrv-wvt6-8yfy |
| summary |
Improper Certificate Validation
Hammer CLI, a CLI utility for Foreman, does not explicitly set the `verify_ssl` flag for `apipie-bindings`. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29494 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29538 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29535 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29612 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29564 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29496 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29442 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2667 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2667, GHSA-77h8-xr85-3x5q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bvrv-wvt6-8yfy |
|
| 46 |
| url |
VCID-bydt-bkf4-rbh2 |
| vulnerability_id |
VCID-bydt-bkf4-rbh2 |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.8482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84761 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84746 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84825 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84829 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.8481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.84781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02327 |
| scoring_system |
epss |
| scoring_elements |
0.8478 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9546, GHSA-5p34-5m6p-p58g
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bydt-bkf4-rbh2 |
|
| 47 |
| url |
VCID-cc8z-r1zy-23f2 |
| vulnerability_id |
VCID-cc8z-r1zy-23f2 |
| summary |
foreman: Information disclosure in provisioning template previews |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4995 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53142 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53166 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53191 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53159 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53212 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53206 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53257 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53226 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4995 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4995
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cc8z-r1zy-23f2 |
|
| 48 |
| url |
VCID-ceub-d4s9-dkcd |
| vulnerability_id |
VCID-ceub-d4s9-dkcd |
| summary |
Deserialization of Untrusted Data
A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the `readValue` method of the `ObjectMapper`. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15095 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08606 |
| scoring_system |
epss |
| scoring_elements |
0.92427 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.08606 |
| scoring_system |
epss |
| scoring_elements |
0.92429 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.92697 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.9273 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.92724 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.9272 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.92709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.92711 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.09261 |
| scoring_system |
epss |
| scoring_elements |
0.92705 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15095 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15095, GHSA-h592-38cm-4ggp
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ceub-d4s9-dkcd |
|
| 49 |
| url |
VCID-crf9-zn1q-vya8 |
| vulnerability_id |
VCID-crf9-zn1q-vya8 |
| summary |
Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6644 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.39981 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40095 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40114 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40129 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40155 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40076 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40142 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6644 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-6644
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-crf9-zn1q-vya8 |
|
| 50 |
| url |
VCID-d4z1-hdkt-r7g1 |
| vulnerability_id |
VCID-d4z1-hdkt-r7g1 |
| summary |
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.8214 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82136 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82128 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82102 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82085 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01674 |
| scoring_system |
epss |
| scoring_elements |
0.82073 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10219 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10219, GHSA-m8p2-495h-ccmh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4z1-hdkt-r7g1 |
|
| 51 |
| url |
VCID-ddqw-aj7g-s7c2 |
| vulnerability_id |
VCID-ddqw-aj7g-s7c2 |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000341 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74093 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74096 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.7409 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74078 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74074 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74042 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000341 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000341 |
| reference_id |
CVE-2016-1000341 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000341 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000341, GHSA-r9ch-m4fh-fc7q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ddqw-aj7g-s7c2 |
|
| 52 |
| url |
VCID-dfb9-31gj-57fs |
| vulnerability_id |
VCID-dfb9-31gj-57fs |
| summary |
foreman: Stored XSS in org/loc wizard |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8634 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55554 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55718 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55721 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5573 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5571 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55693 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8634 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8634
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dfb9-31gj-57fs |
|
| 53 |
| url |
VCID-dh5x-wb2a-1ufj |
| vulnerability_id |
VCID-dh5x-wb2a-1ufj |
| summary |
XSS vulnerabiliy in generated pagination links
The package will_paginate generate pagination links without escaping result. If user-controlled data is sent to will_paginate, there is a potential XSS vulnerability. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6459 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49082 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49103 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49076 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58205 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58225 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.582 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6459 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6459, GHSA-8r6h-7x9g-xmw9, OSV-101138
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5x-wb2a-1ufj |
|
| 54 |
| url |
VCID-dtva-ze8n-vycd |
| vulnerability_id |
VCID-dtva-ze8n-vycd |
| summary |
foreman: inside discovery-debug, the root password is displayed in plaintext |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4996 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1207 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1218 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12226 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12028 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1211 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12161 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12169 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12132 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.121 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4996 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4996
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dtva-ze8n-vycd |
|
| 55 |
| url |
VCID-e488-4fjn-z3g2 |
| vulnerability_id |
VCID-e488-4fjn-z3g2 |
| summary |
foreman: Foreman information leak through unauthorized multiple_checkboxes helper |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7077 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48346 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48381 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48402 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.4841 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48415 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7077 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7077
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e488-4fjn-z3g2 |
|
| 56 |
| url |
VCID-egve-f1uw-nfff |
| vulnerability_id |
VCID-egve-f1uw-nfff |
| summary |
foreman-debug: missing obfuscation of sensitive information |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9593 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44351 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44437 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44445 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44452 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44436 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9593 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9593
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-egve-f1uw-nfff |
|
| 57 |
| url |
VCID-es1t-7196-4kbb |
| vulnerability_id |
VCID-es1t-7196-4kbb |
| summary |
CSRF Vulnerability in rails-ujs
There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains.
Versions Affected: rails <= 6.0.3
Not affected: Applications which don't use rails-ujs.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent.
Workarounds
-----------
To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters.
For example, code like this:
link_to params
to code like this:
link_to filtered_params
def filtered_params
# Filter just the parameters that you trust
end |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69177 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69192 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69213 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69195 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69245 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69285 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69271 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8167 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8167, GHSA-xq5j-gw7f-jgj8
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-es1t-7196-4kbb |
|
| 58 |
| url |
VCID-f4qa-9fn6-97az |
| vulnerability_id |
VCID-f4qa-9fn6-97az |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000342 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64634 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64616 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64621 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64551 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64565 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64511 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.646 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000342 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000342 |
| reference_id |
CVE-2016-1000342 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000342 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000342, GHSA-qcj7-g2j5-g7r3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f4qa-9fn6-97az |
|
| 59 |
| url |
VCID-f73y-mjrg-yfc9 |
| vulnerability_id |
VCID-f73y-mjrg-yfc9 |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000344 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59912 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59867 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.5979 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59913 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59932 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59947 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59926 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000344 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000344 |
| reference_id |
CVE-2016-1000344 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
7.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
7.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000344 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000344, GHSA-2j2x-hx4g-2gf4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f73y-mjrg-yfc9 |
|
| 60 |
| url |
VCID-fq2t-c2nv-23ce |
| vulnerability_id |
VCID-fq2t-c2nv-23ce |
| summary |
A vulnerability in MongoDB can lead to a Denial of Service
condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82181 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82238 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82245 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82264 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01693 |
| scoring_system |
epss |
| scoring_elements |
0.82252 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1609 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1609
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fq2t-c2nv-23ce |
|
| 61 |
| url |
VCID-ftzy-9uny-byfb |
| vulnerability_id |
VCID-ftzy-9uny-byfb |
| summary |
Cross-site Scripting
A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before `3.9.0` are vulnerable. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16887 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57033 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57149 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57126 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5718 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5717 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16887 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-16887 |
| reference_id |
CVE-2018-16887 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-16887 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16887, GHSA-mhhc-r88h-2qrm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftzy-9uny-byfb |
|
| 62 |
| url |
VCID-hmcs-7s53-mbft |
| vulnerability_id |
VCID-hmcs-7s53-mbft |
| summary |
foreman: Recover of plaintext password or token for the compute resources |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3893 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5913 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59277 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59204 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59227 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59244 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3893 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3893
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hmcs-7s53-mbft |
|
| 63 |
| url |
VCID-jae8-w85w-cyfu |
| vulnerability_id |
VCID-jae8-w85w-cyfu |
| summary |
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83885 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83884 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83915 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83854 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83932 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.02064 |
| scoring_system |
epss |
| scoring_elements |
0.83909 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7537 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/3591-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/3591-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7537, GHSA-2f9x-5v75-3qv4, PYSEC-2018-6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jae8-w85w-cyfu |
|
| 64 |
| url |
VCID-jfqz-9a6e-jff7 |
| vulnerability_id |
VCID-jfqz-9a6e-jff7 |
| summary |
foreman: Unprivileged user can access private bookmarks of other users |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4227 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42226 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42276 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42306 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2100 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2100
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfqz-9a6e-jff7 |
|
| 65 |
| url |
VCID-jr7u-m7gc-pydy |
| vulnerability_id |
VCID-jr7u-m7gc-pydy |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000339 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78226 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78236 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78232 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78178 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.78217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01119 |
| scoring_system |
epss |
| scoring_elements |
0.782 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000339 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000339 |
| reference_id |
CVE-2016-1000339 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000339 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000339, GHSA-c8xf-m4ff-jcxj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jr7u-m7gc-pydy |
|
| 66 |
| url |
VCID-jua2-2byr-t3cv |
| vulnerability_id |
VCID-jua2-2byr-t3cv |
| summary |
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000338 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58859 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5889 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58934 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58916 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58793 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000338 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000338, GHSA-4vhj-98r6-424h
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jua2-2byr-t3cv |
|
| 67 |
| url |
VCID-jvp6-892x-nkc7 |
| vulnerability_id |
VCID-jvp6-892x-nkc7 |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9548 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.98166 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.98162 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.98158 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.98156 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.98152 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.57602 |
| scoring_system |
epss |
| scoring_elements |
0.9815 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9548 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9548, GHSA-p43x-xfjf-5jhr
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jvp6-892x-nkc7 |
|
| 68 |
| url |
VCID-ka8b-44hx-mkc5 |
| vulnerability_id |
VCID-ka8b-44hx-mkc5 |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000352 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59913 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59932 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59947 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.5979 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59867 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59912 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000352 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000352 |
| reference_id |
CVE-2016-1000352 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
7.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
7.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000352 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000352, GHSA-w285-wf9q-5w69
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ka8b-44hx-mkc5 |
|
| 69 |
| url |
VCID-kra9-9yr7-nbg6 |
| vulnerability_id |
VCID-kra9-9yr7-nbg6 |
| summary |
Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15699 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81637 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81649 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81671 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81669 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81695 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.817 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01602 |
| scoring_system |
epss |
| scoring_elements |
0.81707 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15699 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15699
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kra9-9yr7-nbg6 |
|
| 70 |
| url |
VCID-kwyu-yq4w-kqe4 |
| vulnerability_id |
VCID-kwyu-yq4w-kqe4 |
| summary |
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87085 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87096 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87114 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87106 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87134 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87148 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03259 |
| scoring_system |
epss |
| scoring_elements |
0.87142 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10237 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10237, GHSA-mvr2-9pj6-7w5j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kwyu-yq4w-kqe4 |
|
| 71 |
| url |
VCID-m29v-624x-kkha |
| vulnerability_id |
VCID-m29v-624x-kkha |
| summary |
candlepin: credentials exposure through log files |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3891 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.128 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12883 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12849 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1281 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12898 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12949 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12752 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12832 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3891 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3891
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m29v-624x-kkha |
|
| 72 |
| url |
VCID-mnkw-23eu-bkgc |
| vulnerability_id |
VCID-mnkw-23eu-bkgc |
| summary |
Ability to forge per-form CSRF tokens in Rails
It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
Impact
------
Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63311 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63364 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63312 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63284 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63225 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8166, GHSA-jp5v-5gx4-jmj9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnkw-23eu-bkgc |
|
| 73 |
| url |
VCID-mv1p-yxvp-pbh6 |
| vulnerability_id |
VCID-mv1p-yxvp-pbh6 |
| summary |
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80172 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80188 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80216 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80226 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80199 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80244 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.8023 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01372 |
| scoring_system |
epss |
| scoring_elements |
0.80224 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7536 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/advisories/GHSA-r28v-mw67-m5p9 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-r28v-mw67-m5p9 |
|
| 9 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://usn.ubuntu.com/3591-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/3591-1 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7536, GHSA-r28v-mw67-m5p9, PYSEC-2018-5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mv1p-yxvp-pbh6 |
|
| 74 |
| url |
VCID-mv26-fzn6-vycf |
| vulnerability_id |
VCID-mv26-fzn6-vycf |
| summary |
No validation of hostname certificate
Net-ldap does not validate the hostname certificate. Ruby is relying on OpenSSL, and one common mistake made by users of OpenSSL is to assume that OpenSSL will validate the hostname in the server's certificate. did not perform hostname validation. and up contain support for hostname validation, but they still require the user to call a few functions to set it up. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17718 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38515 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38441 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38417 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38554 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38453 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38478 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17718 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17718 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17718 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17718, GHSA-m7p8-9w66-9frm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mv26-fzn6-vycf |
|
| 75 |
| url |
VCID-mwus-fmc5-27f2 |
| vulnerability_id |
VCID-mwus-fmc5-27f2 |
| summary |
6: XSS in discovery rule filter autocomplete functionality |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12175 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64624 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64705 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64663 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64711 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64726 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64743 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64731 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00473 |
| scoring_system |
epss |
| scoring_elements |
0.64703 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12175 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-12175
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mwus-fmc5-27f2 |
|
| 76 |
| url |
VCID-nhvk-z1d5-huce |
| vulnerability_id |
VCID-nhvk-z1d5-huce |
| summary |
foreman: unauthorized cache read on RPM-based installations through local user |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29477 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29415 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29518 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29521 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29425 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14334
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nhvk-z1d5-huce |
|
| 77 |
| url |
VCID-nmya-eyxd-9ybe |
| vulnerability_id |
VCID-nmya-eyxd-9ybe |
| summary |
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000632 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81725 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81752 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81776 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81758 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81695 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01611 |
| scoring_system |
epss |
| scoring_elements |
0.81728 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000632 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000632, GHSA-6pcc-3rfx-4gpm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nmya-eyxd-9ybe |
|
| 78 |
| url |
VCID-nugh-hm1r-73c7 |
| vulnerability_id |
VCID-nugh-hm1r-73c7 |
| summary |
Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54902 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54972 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54998 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54968 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55029 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5501 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54988 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14380 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14380
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nugh-hm1r-73c7 |
|
| 79 |
| url |
VCID-p8ab-a4gk-eyd2 |
| vulnerability_id |
VCID-p8ab-a4gk-eyd2 |
| summary |
Multiple vulnerabilities have been found in the Chromium web
browser, the worst of which allows remote attackers to execute arbitrary
code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1669 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81796 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81861 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.8186 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81867 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81807 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81829 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01626 |
| scoring_system |
epss |
| scoring_elements |
0.81853 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1669 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1669
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p8ab-a4gk-eyd2 |
|
| 80 |
| url |
VCID-pd7m-bhqf-kkge |
| vulnerability_id |
VCID-pd7m-bhqf-kkge |
| summary |
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28482 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28365 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28341 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31984 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32052 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32056 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32017 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7536 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7536, GHSA-xxgp-pcfc-3vgc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pd7m-bhqf-kkge |
|
| 81 |
| url |
VCID-ph9r-qphf-8fam |
| vulnerability_id |
VCID-ph9r-qphf-8fam |
| summary |
pulp: Unsafe use of bash $RANDOM for NSS DB password and seed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3704 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67682 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67734 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67748 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67771 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67757 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67724 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3704 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3704
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ph9r-qphf-8fam |
|
| 82 |
| url |
VCID-pnt3-1ssq-tqau |
| vulnerability_id |
VCID-pnt3-1ssq-tqau |
| summary |
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90825 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90818 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.9079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90773 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0615 |
| scoring_system |
epss |
| scoring_elements |
0.90779 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14061 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14061, GHSA-c2q3-4qrh-fm48
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pnt3-1ssq-tqau |
|
| 83 |
| url |
VCID-pyr1-73vu-93ej |
| vulnerability_id |
VCID-pyr1-73vu-93ej |
| summary |
foreman: Persisted XSS on all pages that use breadcrumbs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52446 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52474 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52441 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52493 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52488 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52539 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52522 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00291 |
| scoring_system |
epss |
| scoring_elements |
0.52506 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14664 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14664
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pyr1-73vu-93ej |
|
| 84 |
| url |
VCID-q4x5-bxn7-5yht |
| vulnerability_id |
VCID-q4x5-bxn7-5yht |
| summary |
Timing attack vulnerability
Sinatra rack-protection contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000119 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62419 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62279 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62333 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62383 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0043 |
| scoring_system |
epss |
| scoring_elements |
0.62528 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000119 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000119, GHSA-688c-3x49-6rqj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q4x5-bxn7-5yht |
|
| 85 |
| url |
VCID-qjez-qe32-e3b6 |
| vulnerability_id |
VCID-qjez-qe32-e3b6 |
| summary |
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88249 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88282 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88279 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88273 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88254 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88226 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.03901 |
| scoring_system |
epss |
| scoring_elements |
0.88234 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12781 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/advisories/GHSA-6c7v-2f49-8h26 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-6c7v-2f49-8h26 |
|
| 11 |
| reference_url |
https://github.com/django/django |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/django/django |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://seclists.org/bugtraq/2019/Jul/10 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://seclists.org/bugtraq/2019/Jul/10 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://usn.ubuntu.com/4043-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4043-1 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12781, GHSA-6c7v-2f49-8h26, PYSEC-2019-10
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qjez-qe32-e3b6 |
|
| 86 |
| url |
VCID-qr8s-5r61-skhw |
| vulnerability_id |
VCID-qr8s-5r61-skhw |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000345 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.7409 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74096 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74093 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74078 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74074 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000345 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000345 |
| reference_id |
CVE-2016-1000345 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000345 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000345, GHSA-9gp4-qrff-c648
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8s-5r61-skhw |
|
| 87 |
| url |
VCID-r7tw-km29-4bdp |
| vulnerability_id |
VCID-r7tw-km29-4bdp |
| summary |
HTTP Request Smuggling in Netty
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.8112 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81056 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81065 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81117 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81123 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.8114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01498 |
| scoring_system |
epss |
| scoring_elements |
0.81127 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7238 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://netty.io/news |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://netty.io/news |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7238, GHSA-ff2w-cq2g-wv5f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r7tw-km29-4bdp |
|
| 88 |
| url |
VCID-rnuk-n3a6-cbh9 |
| vulnerability_id |
VCID-rnuk-n3a6-cbh9 |
| summary |
foreman: stored XSS in success notification after entity creation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16861 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59761 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59859 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59829 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.5988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59914 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59881 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16861 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16861
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rnuk-n3a6-cbh9 |
|
| 89 |
| url |
VCID-ruae-hqdg-m7ek |
| vulnerability_id |
VCID-ruae-hqdg-m7ek |
| summary |
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to `com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig` (aka `ibatis-sqlmap`). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9547 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97227 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97226 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97221 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97212 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97211 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.38262 |
| scoring_system |
epss |
| scoring_elements |
0.97199 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9547 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9547, GHSA-q93h-jc49-78gg
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ruae-hqdg-m7ek |
|
| 90 |
| url |
VCID-sa68-rwqe-tfgp |
| vulnerability_id |
VCID-sa68-rwqe-tfgp |
| summary |
foreman: Stored XSS via organization/location with HTML in name |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68875 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68893 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68894 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68944 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00582 |
| scoring_system |
epss |
| scoring_elements |
0.68941 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8639 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8639
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sa68-rwqe-tfgp |
|
| 91 |
| url |
VCID-sg6x-y34w-37bc |
| vulnerability_id |
VCID-sg6x-y34w-37bc |
| summary |
pulp: sensitive credentials revealed through the API |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50869 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50866 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50828 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50868 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1090 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1090
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sg6x-y34w-37bc |
|
| 92 |
| url |
VCID-sw69-1r7d-kkht |
| vulnerability_id |
VCID-sw69-1r7d-kkht |
| summary |
Uncontrolled Resource Consumption
There is a possible DoS vulnerability in the multipart parser in Rack. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39267 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39327 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39296 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39312 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39324 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39285 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16470 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16470, GHSA-hg78-4f6x-99wq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sw69-1r7d-kkht |
|
| 93 |
| url |
VCID-t684-yp58-hkg8 |
| vulnerability_id |
VCID-t684-yp58-hkg8 |
| summary |
ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore
In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like:
```
data = cache.fetch("demo", raw: true) { untrusted_string }
```
Versions Affected: rails < 5.2.5, rails < 6.0.4
Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum,
this vulnerability allows an attacker to inject untrusted Ruby objects into a web application.
In addition to upgrading to the latest versions of Rails, developers should ensure that whenever
they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both
reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes,
detect if data was serialized using the raw option upon deserialization.
Workarounds
-----------
It is recommended that application developers apply the suggested patch or upgrade to the latest release as
soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using
the `raw` argument should be double-checked to ensure that they conform to the expected format. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99586 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99588 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99584 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99585 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99587 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8165 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8165, GHSA-2p68-f74v-9wc6
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t684-yp58-hkg8 |
|
| 94 |
| url |
VCID-tnen-a68v-9bfk |
| vulnerability_id |
VCID-tnen-a68v-9bfk |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77727 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77769 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.7777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77786 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.7776 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77755 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.7771 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77744 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000343 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000343 |
| reference_id |
CVE-2016-1000343 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000343 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000343, GHSA-rrvx-pwf8-p59p
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tnen-a68v-9bfk |
|
| 95 |
| url |
VCID-u29q-3x9x-73da |
| vulnerability_id |
VCID-u29q-3x9x-73da |
| summary |
Regular Expression Denial of Service in websocket-extensions (RubyGem)
### Impact
The ReDoS flaw allows an attacker to exhaust the server's capacity to process incoming requests by sending a WebSocket handshake request containing a header of the following form:
Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ...
That is, a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. The parser takes exponential time to reject this header as invalid, and this will block the processing of any other work on the same thread. Thus if you are running a single-threaded server, such a request can render your service completely unavailable.
### Patches
Users should upgrade to version 0.1.5.
### Workarounds
There are no known work-arounds other than disabling any public-facing WebSocket functionality you are operating.
### References
- https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/ |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85127 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.8513 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85133 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85111 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85086 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.8509 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0242 |
| scoring_system |
epss |
| scoring_elements |
0.85055 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7663 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7663, GHSA-g6wq-qcwm-j5g2
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u29q-3x9x-73da |
|
| 96 |
| url |
VCID-ugqt-zyga-1ydy |
| vulnerability_id |
VCID-ugqt-zyga-1ydy |
| summary |
puppet: puppet server and puppetDB may leak sensitive information via metrics API |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7943 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98487 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98483 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98485 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98475 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.98479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.65366 |
| scoring_system |
epss |
| scoring_elements |
0.9848 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7943 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7943
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ugqt-zyga-1ydy |
|
| 97 |
| url |
VCID-utte-4yve-n7eq |
| vulnerability_id |
VCID-utte-4yve-n7eq |
| summary |
Directive injection when using dynamic overrides with user input
### Impact
If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection.
This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers` are sorted alphabetically so they pretty much all come before `script-src`. A previously undefined directive would receive a value even if `SecureHeaders::OPT_OUT` was supplied.
The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s.
> Duplicate script-src directives detected. All but the first instance will be ignored.
See https://www.w3.org/TR/CSP3/#parse-serialized-policy
> Note: In this case, the user agent SHOULD notify developers that a duplicate directive was ignored. A console warning might be appropriate, for example.
### Patches
Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0.
### Workarounds
If you are passing user input into the above methods, you could filter out the input:
```ruby
override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")])
```
### References
Reported in https://github.com/twitter/secure_headers/issues/418
https://www.w3.org/TR/CSP3/#parse-serialized-policy
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repo](https://github.com/twitter/secure_headers/issues/new)
* DM @ndm on twitter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66876 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6689 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66857 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66808 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6681 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66835 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5217 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5217, GHSA-xq52-rv6w-397c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-utte-4yve-n7eq |
|
| 98 |
| url |
VCID-uygc-h93v-vuh8 |
| vulnerability_id |
VCID-uygc-h93v-vuh8 |
| summary |
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14062 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91699 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91703 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91697 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.9169 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91663 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91656 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91678 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.07334 |
| scoring_system |
epss |
| scoring_elements |
0.91669 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14062 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14062, GHSA-c265-37vj-cwcc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uygc-h93v-vuh8 |
|
| 99 |
| url |
VCID-v61q-45uv-uuf7 |
| vulnerability_id |
VCID-v61q-45uv-uuf7 |
| summary |
puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11751 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44826 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44909 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44928 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44922 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44915 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11751 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11751
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v61q-45uv-uuf7 |
|
| 100 |
| url |
VCID-v9mt-t1pb-hybk |
| vulnerability_id |
VCID-v9mt-t1pb-hybk |
| summary |
Cross site scripting vulnerability in ActionView
There is a possible cross site scripting (XSS) vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
### Impact
There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this:
```erb
<script>let a = `<%= j unknown_input %>`</script>
```
or
```erb
<script>let a = `<%= escape_javascript unknown_input %>`</script>
```
### Releases
The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations.
### Workarounds
For those that can't upgrade, the following monkey patch may be used:
```ruby
ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!(
{
"`" => "\\`",
"$" => "\\$"
}
)
module ActionView::Helpers::JavaScriptHelper
alias :old_ej :escape_javascript
alias :old_j :j
def escape_javascript(javascript)
javascript = javascript.to_s
if javascript.empty?
result = ""
else
result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP)
end
javascript.html_safe? ? result.html_safe : result
end
alias :j :escape_javascript
end
```
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series
* [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series
Please note that only the 5.2 and 6.0 series are supported at present. Users
of earlier unsupported releases are advised to upgrade as soon as possible as we
cannot guarantee the continued availability of security fixes for unsupported
releases.
### Credits
Thanks to Jesse Campos from Chef Secure |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75441 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75493 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75406 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75422 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75409 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5267 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5267 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5267, GHSA-65cv-r6x7-79hv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9mt-t1pb-hybk |
|
| 101 |
| url |
VCID-va8w-uzhc-x3bz |
| vulnerability_id |
VCID-va8w-uzhc-x3bz |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6668 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.93988 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.93998 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.94006 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.94009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.94018 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.94022 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.1282 |
| scoring_system |
epss |
| scoring_elements |
0.94027 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6668 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6668
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-va8w-uzhc-x3bz |
|
| 102 |
| url |
VCID-vhdm-w6p1-uuh9 |
| vulnerability_id |
VCID-vhdm-w6p1-uuh9 |
| summary |
Session fixation vulnerability via Set-Cookie headers
The package rest-client in `abstract_response.rb` improperly handles `Set-Cookie` headers on HTTP redirection responses. Any cookies will be forwarded to the redirection target regardless of domain, path, or expiration. If you control a redirection source, you can cause rest-client to perform a request to any third-party domain with cookies of your choosing, which may be useful in performing a session fixation attack. If you control a redirection target, you can steal any cookies set by the third-party redirection request. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1820 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87929 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87987 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87995 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87977 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87956 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87952 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.03723 |
| scoring_system |
epss |
| scoring_elements |
0.87939 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1820 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1820, GHSA-3fhf-6939-qg8p, OSV-119878
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vhdm-w6p1-uuh9 |
|
| 103 |
| url |
VCID-vhxh-tpay-mbh3 |
| vulnerability_id |
VCID-vhxh-tpay-mbh3 |
| summary |
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98102 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98101 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.9809 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98095 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.5601 |
| scoring_system |
epss |
| scoring_elements |
0.98096 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0224 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0224
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vhxh-tpay-mbh3 |
|
| 104 |
| url |
VCID-w543-qxxs-f7g7 |
| vulnerability_id |
VCID-w543-qxxs-f7g7 |
| summary |
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3596 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35986 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35889 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36109 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35945 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35995 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36024 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5382 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5382, GHSA-8477-3v39-ggpm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w543-qxxs-f7g7 |
|
| 105 |
| url |
VCID-wbgc-tuj3-47by |
| vulnerability_id |
VCID-wbgc-tuj3-47by |
| summary |
Uncontrolled Resource Consumption
RESTEasy enables `GZIPInterceptor`, which allows remote attackers to cause a denial of service via unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6346 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78784 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78778 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78771 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78763 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01184 |
| scoring_system |
epss |
| scoring_elements |
0.78724 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6346 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6346, GHSA-wxvr-vqfp-9cqw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbgc-tuj3-47by |
|
| 106 |
| url |
VCID-wnjy-ggeb-eqcn |
| vulnerability_id |
VCID-wnjy-ggeb-eqcn |
| summary |
puppet: Environment leakage in puppet-agent |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41184 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41306 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.4123 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41288 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.4131 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41264 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10690 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-10690
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wnjy-ggeb-eqcn |
|
| 107 |
| url |
VCID-wucb-ckae-97aq |
| vulnerability_id |
VCID-wucb-ckae-97aq |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10917 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50564 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50568 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50559 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50512 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50567 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50475 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50532 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00271 |
| scoring_system |
epss |
| scoring_elements |
0.50606 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10917 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10917, GHSA-574p-6fw4-4hw8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wucb-ckae-97aq |
|
| 108 |
| url |
VCID-xnyb-nuwm-pkdr |
| vulnerability_id |
VCID-xnyb-nuwm-pkdr |
| summary |
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8840 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92187 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92191 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.9219 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92185 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.08164 |
| scoring_system |
epss |
| scoring_elements |
0.92161 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8840 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8840, GHSA-4w82-r329-3q67
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xnyb-nuwm-pkdr |
|
| 109 |
| url |
VCID-xnz5-gv2x-17bk |
| vulnerability_id |
VCID-xnz5-gv2x-17bk |
| summary |
Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it possible for an attacker to forge a secure or host-only cookie prefix. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.77705 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.77706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.77722 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.77696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.7769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01067 |
| scoring_system |
epss |
| scoring_elements |
0.77662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.7859 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78552 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8184, GHSA-j6w9-fv6q-3q52
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xnz5-gv2x-17bk |
|
| 110 |
| url |
VCID-xzbt-bkdp-8bgh |
| vulnerability_id |
VCID-xzbt-bkdp-8bgh |
| summary |
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000346 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.7645 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76504 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76529 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76508 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76502 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76478 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76445 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.7646 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-1000346 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000346 |
| reference_id |
CVE-2016-1000346 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
3.7 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
3.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-1000346 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-1000346, GHSA-fjqm-246c-mwqg
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xzbt-bkdp-8bgh |
|
| 111 |
| url |
VCID-yw62-qbkq-9ygq |
| vulnerability_id |
VCID-yw62-qbkq-9ygq |
| summary |
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session.
The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
### Impact
The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session.
## Releases
The 1.6.12 and 2.0.8 releases are available at the normal locations.
### Workarounds
There are no known workarounds.
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 1-6-session-timing-attack.patch - Patch for 1.6 series
* 2-0-session-timing-attack.patch - Patch for 2.6 series
### Credits
Thanks Will Leinweber for reporting this! |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79334 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.7936 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79336 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79291 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01251 |
| scoring_system |
epss |
| scoring_elements |
0.79315 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16782 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16782, GHSA-hrqr-hxpp-chr3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yw62-qbkq-9ygq |
|
| 112 |
| url |
VCID-z6er-42pm-7ubq |
| vulnerability_id |
VCID-z6er-42pm-7ubq |
| summary |
Cleartext Transmission of Sensitive Information in Apache MINA
Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0231 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72172 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72158 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72583 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72544 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72552 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00726 |
| scoring_system |
epss |
| scoring_elements |
0.72595 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0231 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-0231, GHSA-5h29-qq92-wj7f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z6er-42pm-7ubq |
|
| 113 |
| url |
VCID-ze79-6kcg-nfcp |
| vulnerability_id |
VCID-ze79-6kcg-nfcp |
| summary |
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92836 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92837 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92832 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92829 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92819 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92816 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92809 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.09511 |
| scoring_system |
epss |
| scoring_elements |
0.92821 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14195 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-14195, GHSA-mc6h-4qgp-37qh
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ze79-6kcg-nfcp |
|
| 114 |
| url |
VCID-zx5n-czhy-6qgu |
| vulnerability_id |
VCID-zx5n-czhy-6qgu |
| summary |
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66831 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66807 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66768 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66873 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66886 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66853 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66804 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.6684 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12387 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/advisories/GHSA-6cc5-2vg4-cc7m |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-6cc5-2vg4-cc7m |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/twisted/twisted |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/twisted/twisted |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://usn.ubuntu.com/4308-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4308-1 |
|
| 16 |
|
| 17 |
| reference_url |
https://usn.ubuntu.com/4308-2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4308-2 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12387, GHSA-6cc5-2vg4-cc7m, PYSEC-2019-128
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zx5n-czhy-6qgu |
|