{"url":"http://public2.vulnerablecode.io/api/packages/1050989?format=json","purl":"pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1","type":"deb","namespace":"debian","name":"epiphany-browser","version":"3.32.1.2-3~deb10u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"48.5-0+deb13u1","latest_non_vulnerable_version":"48.5-0+deb13u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95008?format=json","vulnerability_id":"VCID-4ayz-e7qd-q3hv","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45085","reference_id":"","reference_type":"","scores":[{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52313","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52165","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088"},{"reference_url":"https://usn.ubuntu.com/5561-1/","reference_id":"USN-5561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5561-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2021-45085"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ayz-e7qd-q3hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36512?format=json","vulnerability_id":"VCID-drpr-qvbq-c7ep","summary":"A vulnerability has been discovered in Epiphany, which can lead to a buffer overflow.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29536","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35242","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35863","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35754","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35761","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35712","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3536","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29536"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009959","reference_id":"1009959","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009959"},{"reference_url":"https://security.archlinux.org/AVG-2684","reference_id":"AVG-2684","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2684"},{"reference_url":"https://security.gentoo.org/glsa/202405-27","reference_id":"GLSA-202405-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-27"},{"reference_url":"https://usn.ubuntu.com/5561-1/","reference_id":"USN-5561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5561-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2022-29536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drpr-qvbq-c7ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95009?format=json","vulnerability_id":"VCID-hk4w-wqwm-b7dx","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45086","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43773","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43793","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43659","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43448","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088"},{"reference_url":"https://usn.ubuntu.com/5561-1/","reference_id":"USN-5561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5561-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2021-45086"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hk4w-wqwm-b7dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95010?format=json","vulnerability_id":"VCID-kr9h-du4n-zbck","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45087","reference_id":"","reference_type":"","scores":[{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52313","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52165","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088"},{"reference_url":"https://usn.ubuntu.com/5561-1/","reference_id":"USN-5561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5561-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2021-45087"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kr9h-du4n-zbck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78781?format=json","vulnerability_id":"VCID-t8h7-hah9-bkaw","summary":"gvdb: use after free issue was  fixed in gvdb_table_write_contents_async()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25085.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25085","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67512","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67577","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6758","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67587","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156440","reference_id":"2156440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156440"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2019-25085"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t8h7-hah9-bkaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95011?format=json","vulnerability_id":"VCID-v1k1-swqj-akcj","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45088","reference_id":"","reference_type":"","scores":[{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52313","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52165","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586044?format=json","purl":"pkg:deb/debian/epiphany-browser@3.38.2-1%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bpgn-654d-5kh6"},{"vulnerability":"VCID-qu2d-vqp3-w3e3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.38.2-1%252Bdeb11u3"}],"aliases":["CVE-2021-45088"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1k1-swqj-akcj"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93475?format=json","vulnerability_id":"VCID-fw5u-mcy4-1uaz","summary":"ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00043.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11396","reference_id":"","reference_type":"","scores":[{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7174","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71627","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71634","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71625","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7175","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11396"},{"reference_url":"https://bugzilla.gnome.org/show_bug.cgi?id=795740","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.gnome.org/show_bug.cgi?id=795740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899409","reference_id":"899409","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899409"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11396","reference_id":"CVE-2018-11396","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11396"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050989?format=json","purl":"pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4ayz-e7qd-q3hv"},{"vulnerability":"VCID-drpr-qvbq-c7ep"},{"vulnerability":"VCID-hk4w-wqwm-b7dx"},{"vulnerability":"VCID-kr9h-du4n-zbck"},{"vulnerability":"VCID-t8h7-hah9-bkaw"},{"vulnerability":"VCID-v1k1-swqj-akcj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1"}],"aliases":["CVE-2018-11396"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fw5u-mcy4-1uaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93500?format=json","vulnerability_id":"VCID-wruk-nknh-2fh4","summary":"libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via certain window.open and document.write calls.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12016","reference_id":"","reference_type":"","scores":[{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.7567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.7565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75655","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12016"},{"reference_url":"https://github.com/ldpreload/Disclosure/blob/master/EpiphanyDoS.txt","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ldpreload/Disclosure/blob/master/EpiphanyDoS.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901018","reference_id":"901018","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901018"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12016","reference_id":"CVE-2018-12016","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12016"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050989?format=json","purl":"pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4ayz-e7qd-q3hv"},{"vulnerability":"VCID-drpr-qvbq-c7ep"},{"vulnerability":"VCID-hk4w-wqwm-b7dx"},{"vulnerability":"VCID-kr9h-du4n-zbck"},{"vulnerability":"VCID-t8h7-hah9-bkaw"},{"vulnerability":"VCID-v1k1-swqj-akcj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1"}],"aliases":["CVE-2018-12016"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wruk-nknh-2fh4"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/epiphany-browser@3.32.1.2-3~deb10u1"}