Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/nss@2:3.123-1?distro=trixie
Typedeb
Namespacedebian
Namenss
Version2:3.123-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1ert-2qyc-cfc1
vulnerability_id VCID-1ert-2qyc-cfc1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
reference_id
reference_type
scores
0
value 0.00829
scoring_system epss
scoring_elements 0.74562
published_at 2026-04-18T12:55:00Z
1
value 0.00829
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-01T12:55:00Z
2
value 0.00829
scoring_system epss
scoring_elements 0.74474
published_at 2026-04-02T12:55:00Z
3
value 0.00829
scoring_system epss
scoring_elements 0.745
published_at 2026-04-04T12:55:00Z
4
value 0.00829
scoring_system epss
scoring_elements 0.74475
published_at 2026-04-07T12:55:00Z
5
value 0.00829
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-08T12:55:00Z
6
value 0.00829
scoring_system epss
scoring_elements 0.74523
published_at 2026-04-09T12:55:00Z
7
value 0.00829
scoring_system epss
scoring_elements 0.74544
published_at 2026-04-11T12:55:00Z
8
value 0.00829
scoring_system epss
scoring_elements 0.74525
published_at 2026-04-12T12:55:00Z
9
value 0.00829
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-13T12:55:00Z
10
value 0.00829
scoring_system epss
scoring_elements 0.74555
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
reference_id 1079851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
reference_id mfsa2014-45
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
9
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
10
reference_url https://access.redhat.com/errata/RHSA-2014:1073
reference_id RHSA-2014:1073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1073
11
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
12
reference_url https://usn.ubuntu.com/2159-1/
reference_id USN-2159-1
reference_type
scores
url https://usn.ubuntu.com/2159-1/
13
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.16-1?distro=trixie
purl pkg:deb/debian/nss@2:3.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.16-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1492
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ert-2qyc-cfc1
1
url VCID-2tts-gwgd-zqcz
vulnerability_id VCID-2tts-gwgd-zqcz
summary A vulnerability has been discovered in NSS, which can lead to the recovery of private data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-04T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39691
published_at 2026-04-02T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47729
published_at 2026-04-12T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-18T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47794
published_at 2026-04-16T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47739
published_at 2026-04-21T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47752
published_at 2026-04-11T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47727
published_at 2026-04-09T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47732
published_at 2026-04-08T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47677
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
reference_id 1056284
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
reference_id 2243644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
15
reference_url https://security.gentoo.org/glsa/202508-04
reference_id GLSA-202508-04
reference_type
scores
url https://security.gentoo.org/glsa/202508-04
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:0093
reference_id RHSA-2024:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0093
25
reference_url https://access.redhat.com/errata/RHSA-2024:0105
reference_id RHSA-2024:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0105
26
reference_url https://access.redhat.com/errata/RHSA-2024:0106
reference_id RHSA-2024:0106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0106
27
reference_url https://access.redhat.com/errata/RHSA-2024:0107
reference_id RHSA-2024:0107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0107
28
reference_url https://access.redhat.com/errata/RHSA-2024:0108
reference_id RHSA-2024:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
30
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
31
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
32
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
33
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
34
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
35
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
36
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
37
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
38
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
39
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
40
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
41
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
42
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
43
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
44
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
45
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
46
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
47
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
reference_id show_bug.cgi?id=1780432
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
48
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
49
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
50
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.98-1?distro=trixie
purl pkg:deb/debian/nss@2:3.98-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.98-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2023-5388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tts-gwgd-zqcz
2
url VCID-2w58-mdmk-guh8
vulnerability_id VCID-2w58-mdmk-guh8
summary
Mozilla has updated the version of Network Security Services
(NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated
networking security issues reported by Mozilla engineers Tyson Smith and
Jed Davis.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-2779.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2779.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2834
reference_id
reference_type
scores
0
value 0.00399
scoring_system epss
scoring_elements 0.60676
published_at 2026-04-21T12:55:00Z
1
value 0.00399
scoring_system epss
scoring_elements 0.60515
published_at 2026-04-01T12:55:00Z
2
value 0.00399
scoring_system epss
scoring_elements 0.60663
published_at 2026-04-12T12:55:00Z
3
value 0.00399
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-13T12:55:00Z
4
value 0.00399
scoring_system epss
scoring_elements 0.60685
published_at 2026-04-16T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60691
published_at 2026-04-18T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.6059
published_at 2026-04-02T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60619
published_at 2026-04-04T12:55:00Z
8
value 0.00399
scoring_system epss
scoring_elements 0.60589
published_at 2026-04-07T12:55:00Z
9
value 0.00399
scoring_system epss
scoring_elements 0.60638
published_at 2026-04-08T12:55:00Z
10
value 0.00399
scoring_system epss
scoring_elements 0.60653
published_at 2026-04-09T12:55:00Z
11
value 0.00399
scoring_system epss
scoring_elements 0.60678
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2834
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
15
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
21
reference_url http://www.securityfocus.com/bid/91072
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91072
22
reference_url http://www.securitytracker.com/id/1036057
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036057
23
reference_url http://www.ubuntu.com/usn/USN-2993-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2993-1
24
reference_url http://www.ubuntu.com/usn/USN-3029-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3029-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1347908
reference_id 1347908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1347908
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834
reference_id CVE-2016-2834
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2834
reference_id CVE-2016-2834
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2834
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-61
reference_id mfsa2016-61
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-61
44
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
45
reference_url https://usn.ubuntu.com/2993-1/
reference_id USN-2993-1
reference_type
scores
url https://usn.ubuntu.com/2993-1/
46
reference_url https://usn.ubuntu.com/3029-1/
reference_id USN-3029-1
reference_type
scores
url https://usn.ubuntu.com/3029-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.23-1?distro=trixie
purl pkg:deb/debian/nss@2:3.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.23-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-2834
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w58-mdmk-guh8
3
url VCID-2w9f-avet-g7c5
vulnerability_id VCID-2w9f-avet-g7c5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
reference_id
reference_type
scores
0
value 0.05021
scoring_system epss
scoring_elements 0.89743
published_at 2026-04-21T12:55:00Z
1
value 0.05021
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-01T12:55:00Z
2
value 0.05021
scoring_system epss
scoring_elements 0.89747
published_at 2026-04-16T12:55:00Z
3
value 0.05021
scoring_system epss
scoring_elements 0.89748
published_at 2026-04-18T12:55:00Z
4
value 0.05021
scoring_system epss
scoring_elements 0.89692
published_at 2026-04-02T12:55:00Z
5
value 0.05021
scoring_system epss
scoring_elements 0.89706
published_at 2026-04-04T12:55:00Z
6
value 0.05021
scoring_system epss
scoring_elements 0.89709
published_at 2026-04-07T12:55:00Z
7
value 0.05021
scoring_system epss
scoring_elements 0.89726
published_at 2026-04-08T12:55:00Z
8
value 0.05021
scoring_system epss
scoring_elements 0.89733
published_at 2026-04-09T12:55:00Z
9
value 0.05021
scoring_system epss
scoring_elements 0.8974
published_at 2026-04-11T12:55:00Z
10
value 0.05021
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-12T12:55:00Z
11
value 0.05021
scoring_system epss
scoring_elements 0.89731
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
reference_id 1269345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
reference_id CVE-2015-7181
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
67
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
68
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
69
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
70
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
71
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
72
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
73
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
74
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
75
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.20.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.20.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.20.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-7181
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w9f-avet-g7c5
4
url VCID-2zrv-q4tb-wqeg
vulnerability_id VCID-2zrv-q4tb-wqeg
summary
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks.
Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel.
By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key.
The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.45135
published_at 2026-04-21T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.4519
published_at 2026-04-16T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45184
published_at 2026-04-18T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45132
published_at 2026-04-02T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45154
published_at 2026-04-04T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45096
published_at 2026-04-07T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-09T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45171
published_at 2026-04-11T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45138
published_at 2026-04-12T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.4514
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
reference_id 2238677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
reference_id mfsa2023-53
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
6
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2023-4421
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zrv-q4tb-wqeg
5
url VCID-3nrj-5r53-37ab
vulnerability_id VCID-3nrj-5r53-37ab
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.36019
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35875
published_at 2026-04-21T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-12T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-13T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35938
published_at 2026-04-16T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-18T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.3605
published_at 2026-04-04T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-07T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35932
published_at 2026-04-08T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35955
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35961
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
reference_id 1059054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
reference_id 2249906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0785
reference_id RHSA-2024:0785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0785
8
reference_url https://access.redhat.com/errata/RHSA-2024:0786
reference_id RHSA-2024:0786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0786
9
reference_url https://access.redhat.com/errata/RHSA-2024:0790
reference_id RHSA-2024:0790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0790
10
reference_url https://access.redhat.com/errata/RHSA-2024:0791
reference_id RHSA-2024:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0791
11
reference_url https://access.redhat.com/errata/RHSA-2024:1686
reference_id RHSA-2024:1686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1686
12
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
13
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
14
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
15
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
reference_id show_bug.cgi?id=1853908
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
17
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
18
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.95-1?distro=trixie
purl pkg:deb/debian/nss@2:3.95-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.95-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2023-6135
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nrj-5r53-37ab
6
url VCID-46cy-x3cp-tke5
vulnerability_id VCID-46cy-x3cp-tke5
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.76077
published_at 2026-04-18T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.76074
published_at 2026-04-16T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76033
published_at 2026-04-13T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.7599
published_at 2026-04-07T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-09T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.76023
published_at 2026-04-08T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-02T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-04T12:55:00Z
8
value 0.00926
scoring_system epss
scoring_elements 0.76039
published_at 2026-04-12T12:55:00Z
9
value 0.00926
scoring_system epss
scoring_elements 0.76062
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
reference_id 2260012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
14
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
25
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
26
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
27
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
28
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
29
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
30
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
31
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
32
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
33
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
34
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
35
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
36
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
37
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
38
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
39
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
40
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
41
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
42
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
reference_id show_bug.cgi?id=1867408
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
43
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
44
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.96.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.96.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.96.1-1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2024-0743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5
7
url VCID-5wqt-2dtu-8qa4
vulnerability_id VCID-5wqt-2dtu-8qa4
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
2
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
3
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0495.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0495.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1950.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1950.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1950
reference_id
reference_type
scores
0
value 0.01867
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-21T12:55:00Z
1
value 0.01867
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-01T12:55:00Z
2
value 0.01867
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-11T12:55:00Z
3
value 0.01867
scoring_system epss
scoring_elements 0.83084
published_at 2026-04-12T12:55:00Z
4
value 0.01867
scoring_system epss
scoring_elements 0.8308
published_at 2026-04-13T12:55:00Z
5
value 0.01867
scoring_system epss
scoring_elements 0.83118
published_at 2026-04-18T12:55:00Z
6
value 0.01867
scoring_system epss
scoring_elements 0.83031
published_at 2026-04-02T12:55:00Z
7
value 0.01867
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-04T12:55:00Z
8
value 0.01867
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-07T12:55:00Z
9
value 0.01867
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-08T12:55:00Z
10
value 0.01867
scoring_system epss
scoring_elements 0.83074
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1950
14
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1245528
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1245528
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802
46
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.3_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.3_release_notes
47
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://support.apple.com/HT206166
reference_id
reference_type
scores
url https://support.apple.com/HT206166
50
reference_url https://support.apple.com/HT206167
reference_id
reference_type
scores
url https://support.apple.com/HT206167
51
reference_url https://support.apple.com/HT206168
reference_id
reference_type
scores
url https://support.apple.com/HT206168
52
reference_url https://support.apple.com/HT206169
reference_id
reference_type
scores
url https://support.apple.com/HT206169
53
reference_url http://www.debian.org/security/2016/dsa-3510
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3510
54
reference_url http://www.debian.org/security/2016/dsa-3520
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3520
55
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
56
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-35.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-35.html
57
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
58
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
59
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
60
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
61
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
62
reference_url http://www.securityfocus.com/bid/84223
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84223
63
reference_url http://www.securitytracker.com/id/1035215
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035215
64
reference_url http://www.ubuntu.com/usn/USN-2917-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-1
65
reference_url http://www.ubuntu.com/usn/USN-2917-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-2
66
reference_url http://www.ubuntu.com/usn/USN-2917-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-3
67
reference_url http://www.ubuntu.com/usn/USN-2924-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2924-1
68
reference_url http://www.ubuntu.com/usn/USN-2934-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2934-1
69
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1310509
reference_id 1310509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1310509
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1950
reference_id CVE-2016-1950
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1950
101
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
102
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-35
reference_id mfsa2016-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-35
103
reference_url https://access.redhat.com/errata/RHSA-2016:0370
reference_id RHSA-2016:0370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0370
104
reference_url https://access.redhat.com/errata/RHSA-2016:0371
reference_id RHSA-2016:0371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0371
105
reference_url https://access.redhat.com/errata/RHSA-2016:0495
reference_id RHSA-2016:0495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0495
106
reference_url https://usn.ubuntu.com/2917-1/
reference_id USN-2917-1
reference_type
scores
url https://usn.ubuntu.com/2917-1/
107
reference_url https://usn.ubuntu.com/2924-1/
reference_id USN-2924-1
reference_type
scores
url https://usn.ubuntu.com/2924-1/
108
reference_url https://usn.ubuntu.com/2934-1/
reference_id USN-2934-1
reference_type
scores
url https://usn.ubuntu.com/2934-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.23-1?distro=trixie
purl pkg:deb/debian/nss@2:3.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.23-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-1950
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wqt-2dtu-8qa4
8
url VCID-6fvj-phnx-kfgs
vulnerability_id VCID-6fvj-phnx-kfgs
summary After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75599
published_at 2026-04-01T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75684
published_at 2026-04-21T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.75695
published_at 2026-04-16T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.75699
published_at 2026-04-18T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-02T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-04T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-07T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.75646
published_at 2026-04-08T12:55:00Z
8
value 0.00899
scoring_system epss
scoring_elements 0.75657
published_at 2026-04-13T12:55:00Z
9
value 0.00899
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-11T12:55:00Z
10
value 0.00899
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
reference_id 1791225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
7
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
8
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
14
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.49-1?distro=trixie
purl pkg:deb/debian/nss@2:3.49-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.49-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-17023
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fvj-phnx-kfgs
9
url VCID-7jt2-zr49-7ye5
vulnerability_id VCID-7jt2-zr49-7ye5
summary
references
0
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
reference_id mfsa2026-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
1
reference_url https://www.mozilla.org/security/advisories/mfsa2026-30/
reference_id mfsa2026-30
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T16:37:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-30/
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
reference_id mfsa2026-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
3
reference_url https://www.mozilla.org/security/advisories/mfsa2026-32/
reference_id mfsa2026-32
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T16:37:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-32/
4
reference_url https://www.mozilla.org/security/advisories/mfsa2026-33/
reference_id mfsa2026-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T16:37:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-33/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2026-34/
reference_id mfsa2026-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T16:37:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-34/
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2023207
reference_id show_bug.cgi?id=2023207
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T16:37:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2023207
fixed_packages
0
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2026-6766
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jt2-zr49-7ye5
10
url VCID-7msj-wyd6-zkbe
vulnerability_id VCID-7msj-wyd6-zkbe
summary nss: Check length of inputs for cryptographic primitives
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
reference_id
reference_type
scores
0
value 0.03036
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-01T12:55:00Z
1
value 0.03036
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-02T12:55:00Z
2
value 0.03036
scoring_system epss
scoring_elements 0.86636
published_at 2026-04-04T12:55:00Z
3
value 0.03036
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-07T12:55:00Z
4
value 0.03036
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-08T12:55:00Z
5
value 0.03036
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-09T12:55:00Z
6
value 0.03036
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-11T12:55:00Z
7
value 0.03036
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-12T12:55:00Z
8
value 0.03036
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-13T12:55:00Z
9
value 0.03036
scoring_system epss
scoring_elements 0.86681
published_at 2026-04-21T12:55:00Z
10
value 0.03036
scoring_system epss
scoring_elements 0.86688
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
reference_id 1775916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
8
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
9
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
10
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
11
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
14
reference_url https://usn.ubuntu.com/4231-1/
reference_id USN-4231-1
reference_type
scores
url https://usn.ubuntu.com/4231-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.47-1?distro=trixie
purl pkg:deb/debian/nss@2:3.47-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.47-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-17006
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7msj-wyd6-zkbe
11
url VCID-8j3v-g9xv-gud5
vulnerability_id VCID-8j3v-g9xv-gud5
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
reference_id
reference_type
scores
0
value 0.02604
scoring_system epss
scoring_elements 0.85647
published_at 2026-04-21T12:55:00Z
1
value 0.02604
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-01T12:55:00Z
2
value 0.02604
scoring_system epss
scoring_elements 0.85563
published_at 2026-04-02T12:55:00Z
3
value 0.02604
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-04T12:55:00Z
4
value 0.02604
scoring_system epss
scoring_elements 0.85585
published_at 2026-04-07T12:55:00Z
5
value 0.02604
scoring_system epss
scoring_elements 0.85605
published_at 2026-04-08T12:55:00Z
6
value 0.02604
scoring_system epss
scoring_elements 0.85616
published_at 2026-04-09T12:55:00Z
7
value 0.02604
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-11T12:55:00Z
8
value 0.02604
scoring_system epss
scoring_elements 0.85626
published_at 2026-04-12T12:55:00Z
9
value 0.02604
scoring_system epss
scoring_elements 0.85622
published_at 2026-04-13T12:55:00Z
10
value 0.02604
scoring_system epss
scoring_elements 0.85645
published_at 2026-04-16T12:55:00Z
11
value 0.02604
scoring_system epss
scoring_elements 0.85651
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
reference_id 1031458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
14
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
15
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-1741
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8j3v-g9xv-gud5
12
url VCID-8qtg-h4km-bfg2
vulnerability_id VCID-8qtg-h4km-bfg2
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.63528
published_at 2026-04-21T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-07T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.63517
published_at 2026-04-08T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63534
published_at 2026-04-12T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.6355
published_at 2026-04-11T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63536
published_at 2026-04-16T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.63543
published_at 2026-04-18T12:55:00Z
7
value 0.00447
scoring_system epss
scoring_elements 0.63413
published_at 2026-04-01T12:55:00Z
8
value 0.00447
scoring_system epss
scoring_elements 0.63473
published_at 2026-04-02T12:55:00Z
9
value 0.00447
scoring_system epss
scoring_elements 0.635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
reference_id 1728436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
15
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
16
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
17
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
18
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
19
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.45-1?distro=trixie
purl pkg:deb/debian/nss@2:3.45-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.45-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-11719
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qtg-h4km-bfg2
13
url VCID-8z26-rmnt-m7bw
vulnerability_id VCID-8z26-rmnt-m7bw
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3640
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56613
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56709
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.5673
published_at 2026-04-04T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56708
published_at 2026-04-07T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.5676
published_at 2026-04-16T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56764
published_at 2026-04-09T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56773
published_at 2026-04-11T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.5675
published_at 2026-04-12T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56729
published_at 2026-04-13T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56757
published_at 2026-04-18T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56731
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647614
reference_id 647614
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647614
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=748379
reference_id 748379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=748379
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
fixed_packages
0
url pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1?distro=trixie
purl pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2011-3640
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8z26-rmnt-m7bw
14
url VCID-9e9c-9p3v-87e9
vulnerability_id VCID-9e9c-9p3v-87e9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3173.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3173.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3173
reference_id
reference_type
scores
0
value 0.02315
scoring_system epss
scoring_elements 0.84807
published_at 2026-04-18T12:55:00Z
1
value 0.02315
scoring_system epss
scoring_elements 0.84804
published_at 2026-04-21T12:55:00Z
2
value 0.02315
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-12T12:55:00Z
3
value 0.02315
scoring_system epss
scoring_elements 0.84784
published_at 2026-04-13T12:55:00Z
4
value 0.02315
scoring_system epss
scoring_elements 0.84805
published_at 2026-04-16T12:55:00Z
5
value 0.02346
scoring_system epss
scoring_elements 0.84864
published_at 2026-04-08T12:55:00Z
6
value 0.02346
scoring_system epss
scoring_elements 0.8489
published_at 2026-04-11T12:55:00Z
7
value 0.02346
scoring_system epss
scoring_elements 0.84871
published_at 2026-04-09T12:55:00Z
8
value 0.02346
scoring_system epss
scoring_elements 0.84807
published_at 2026-04-01T12:55:00Z
9
value 0.02346
scoring_system epss
scoring_elements 0.84822
published_at 2026-04-02T12:55:00Z
10
value 0.02346
scoring_system epss
scoring_elements 0.8484
published_at 2026-04-04T12:55:00Z
11
value 0.02346
scoring_system epss
scoring_elements 0.84842
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3173
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=554354
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=554354
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=583337
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=583337
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=587234
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=587234
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=595300
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=595300
7
reference_url http://secunia.com/advisories/41839
reference_id
reference_type
scores
url http://secunia.com/advisories/41839
8
reference_url http://secunia.com/advisories/42867
reference_id
reference_type
scores
url http://secunia.com/advisories/42867
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12118
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12118
10
reference_url http://support.avaya.com/css/P8/documents/100114250
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114250
11
reference_url http://support.avaya.com/css/P8/documents/100120156
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100120156
12
reference_url http://www.debian.org/security/2010/dsa-2123
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2123
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:210
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:210
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:211
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:211
15
reference_url http://www.mozilla.org/security/announce/2010/mfsa2010-72.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2010/mfsa2010-72.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0781.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0781.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2010-0782.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0782.html
18
reference_url http://www.ubuntu.com/usn/USN-1007-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1007-1
19
reference_url http://www.vupen.com/english/advisories/2011/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0061
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=642302
reference_id 642302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=642302
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173
reference_id CVE-2010-3173
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173
243
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3173
reference_id CVE-2010-3173
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3173
244
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
245
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-72
reference_id mfsa2010-72
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-72
246
reference_url https://access.redhat.com/errata/RHSA-2010:0781
reference_id RHSA-2010:0781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0781
247
reference_url https://access.redhat.com/errata/RHSA-2010:0782
reference_id RHSA-2010:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0782
248
reference_url https://usn.ubuntu.com/1007-1/
reference_id USN-1007-1
reference_type
scores
url https://usn.ubuntu.com/1007-1/
fixed_packages
0
url pkg:deb/debian/nss@3.12.8-1?distro=trixie
purl pkg:deb/debian/nss@3.12.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.8-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2010-3173
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e9c-9p3v-87e9
15
url VCID-9mux-fuyc-a7dx
vulnerability_id VCID-9mux-fuyc-a7dx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
reference_id
reference_type
scores
0
value 0.01048
scoring_system epss
scoring_elements 0.77541
published_at 2026-04-21T12:55:00Z
1
value 0.01048
scoring_system epss
scoring_elements 0.77455
published_at 2026-04-01T12:55:00Z
2
value 0.01048
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-13T12:55:00Z
3
value 0.01048
scoring_system epss
scoring_elements 0.77552
published_at 2026-04-16T12:55:00Z
4
value 0.01048
scoring_system epss
scoring_elements 0.77549
published_at 2026-04-18T12:55:00Z
5
value 0.01048
scoring_system epss
scoring_elements 0.77461
published_at 2026-04-02T12:55:00Z
6
value 0.01048
scoring_system epss
scoring_elements 0.77486
published_at 2026-04-04T12:55:00Z
7
value 0.01048
scoring_system epss
scoring_elements 0.77467
published_at 2026-04-07T12:55:00Z
8
value 0.01048
scoring_system epss
scoring_elements 0.77497
published_at 2026-04-08T12:55:00Z
9
value 0.01048
scoring_system epss
scoring_elements 0.77506
published_at 2026-04-09T12:55:00Z
10
value 0.01048
scoring_system epss
scoring_elements 0.77532
published_at 2026-04-11T12:55:00Z
11
value 0.01048
scoring_system epss
scoring_elements 0.77516
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
5
reference_url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
13
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
14
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
15
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
16
reference_url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
reference_id
reference_type
scores
url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.securityfocus.com/bid/81955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81955
21
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
22
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
23
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
24
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
25
reference_url http://www.ubuntu.com/usn/USN-2903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-1
26
reference_url http://www.ubuntu.com/usn/USN-2903-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-2
27
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
reference_id 1305159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
36
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
37
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
38
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
reference_id mfsa2016-07
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
39
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
40
reference_url https://usn.ubuntu.com/2903-1/
reference_id USN-2903-1
reference_type
scores
url https://usn.ubuntu.com/2903-1/
41
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.21-1?distro=trixie
purl pkg:deb/debian/nss@2:3.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.21-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-1938
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mux-fuyc-a7dx
16
url VCID-aaas-s64r-gfhg
vulnerability_id VCID-aaas-s64r-gfhg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3170.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3170.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3170
reference_id
reference_type
scores
0
value 0.01158
scoring_system epss
scoring_elements 0.78596
published_at 2026-04-21T12:55:00Z
1
value 0.01158
scoring_system epss
scoring_elements 0.78522
published_at 2026-04-01T12:55:00Z
2
value 0.01158
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-13T12:55:00Z
3
value 0.01158
scoring_system epss
scoring_elements 0.78599
published_at 2026-04-16T12:55:00Z
4
value 0.01158
scoring_system epss
scoring_elements 0.78529
published_at 2026-04-02T12:55:00Z
5
value 0.01158
scoring_system epss
scoring_elements 0.78559
published_at 2026-04-04T12:55:00Z
6
value 0.01158
scoring_system epss
scoring_elements 0.78542
published_at 2026-04-07T12:55:00Z
7
value 0.01158
scoring_system epss
scoring_elements 0.78568
published_at 2026-04-08T12:55:00Z
8
value 0.01158
scoring_system epss
scoring_elements 0.78574
published_at 2026-04-09T12:55:00Z
9
value 0.01158
scoring_system epss
scoring_elements 0.78598
published_at 2026-04-18T12:55:00Z
10
value 0.01158
scoring_system epss
scoring_elements 0.78579
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3170
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=578697
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=578697
5
reference_url http://secunia.com/advisories/41839
reference_id
reference_type
scores
url http://secunia.com/advisories/41839
6
reference_url http://secunia.com/advisories/42867
reference_id
reference_type
scores
url http://secunia.com/advisories/42867
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12254
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12254
8
reference_url http://support.avaya.com/css/P8/documents/100114250
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114250
9
reference_url http://support.avaya.com/css/P8/documents/100120156
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100120156
10
reference_url http://www.debian.org/security/2010/dsa-2123
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2123
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:210
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:210
12
reference_url http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0781.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0781.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0782.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0782.html
15
reference_url http://www.ubuntu.com/usn/USN-1007-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1007-1
16
reference_url http://www.vupen.com/english/advisories/2011/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0061
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=630047
reference_id 630047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=630047
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170
reference_id CVE-2010-3170
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170
240
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3170
reference_id CVE-2010-3170
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3170
241
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
242
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-70
reference_id mfsa2010-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-70
243
reference_url https://access.redhat.com/errata/RHSA-2010:0781
reference_id RHSA-2010:0781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0781
244
reference_url https://access.redhat.com/errata/RHSA-2010:0782
reference_id RHSA-2010:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0782
245
reference_url https://access.redhat.com/errata/RHSA-2010:0862
reference_id RHSA-2010:0862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0862
246
reference_url https://usn.ubuntu.com/1007-1/
reference_id USN-1007-1
reference_type
scores
url https://usn.ubuntu.com/1007-1/
fixed_packages
0
url pkg:deb/debian/nss@3.12.8-1?distro=trixie
purl pkg:deb/debian/nss@3.12.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.8-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2010-3170
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aaas-s64r-gfhg
17
url VCID-b1m6-r1bv-d7gr
vulnerability_id VCID-b1m6-r1bv-d7gr
summary
Multiple vulnerabilities have been found in PolarSSL, the worst of
    which might allow a remote attacker to cause a Denial of Service condition.
references
0
reference_url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
reference_id
reference_type
scores
url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
10
reference_url http://marc.info/?l=bugtraq&m=136396549913849&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136396549913849&w=2
11
reference_url http://marc.info/?l=bugtraq&m=136432043316835&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136432043316835&w=2
12
reference_url http://marc.info/?l=bugtraq&m=136439120408139&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136439120408139&w=2
13
reference_url http://marc.info/?l=bugtraq&m=136733161405818&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136733161405818&w=2
14
reference_url http://marc.info/?l=bugtraq&m=137545771702053&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=137545771702053&w=2
15
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
16
reference_url http://rhn.redhat.com/errata/RHSA-2013-0587.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0587.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2013-0782.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0782.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2013-0783.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0783.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2013-0833.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0833.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2013-1455.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1455.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2013-1456.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1456.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
reference_id
reference_type
scores
0
value 0.00773
scoring_system epss
scoring_elements 0.73526
published_at 2026-04-01T12:55:00Z
1
value 0.00773
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-02T12:55:00Z
2
value 0.00773
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-04T12:55:00Z
3
value 0.00773
scoring_system epss
scoring_elements 0.73528
published_at 2026-04-07T12:55:00Z
4
value 0.00773
scoring_system epss
scoring_elements 0.73565
published_at 2026-04-08T12:55:00Z
5
value 0.00773
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-09T12:55:00Z
6
value 0.00928
scoring_system epss
scoring_elements 0.76077
published_at 2026-04-12T12:55:00Z
7
value 0.00928
scoring_system epss
scoring_elements 0.76101
published_at 2026-04-11T12:55:00Z
8
value 0.00928
scoring_system epss
scoring_elements 0.76119
published_at 2026-04-18T12:55:00Z
9
value 0.00928
scoring_system epss
scoring_elements 0.76103
published_at 2026-04-21T12:55:00Z
10
value 0.00928
scoring_system epss
scoring_elements 0.76075
published_at 2026-04-13T12:55:00Z
11
value 0.00928
scoring_system epss
scoring_elements 0.76115
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
24
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
26
reference_url http://secunia.com/advisories/53623
reference_id
reference_type
scores
url http://secunia.com/advisories/53623
27
reference_url http://secunia.com/advisories/55108
reference_id
reference_type
scores
url http://secunia.com/advisories/55108
28
reference_url http://secunia.com/advisories/55139
reference_id
reference_type
scores
url http://secunia.com/advisories/55139
29
reference_url http://secunia.com/advisories/55322
reference_id
reference_type
scores
url http://secunia.com/advisories/55322
30
reference_url http://secunia.com/advisories/55350
reference_id
reference_type
scores
url http://secunia.com/advisories/55350
31
reference_url http://secunia.com/advisories/55351
reference_id
reference_type
scores
url http://secunia.com/advisories/55351
32
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
33
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
37
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
38
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
39
reference_url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
reference_id
reference_type
scores
url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
40
reference_url https://puppet.com/security/cve/cve-2013-0169
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2013-0169
41
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
42
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
43
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
44
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
45
reference_url http://www.debian.org/security/2013/dsa-2621
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2621
46
reference_url http://www.debian.org/security/2013/dsa-2622
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2622
47
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
48
reference_url http://www.kb.cert.org/vuls/id/737740
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/737740
49
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
50
reference_url http://www.matrixssl.org/news.html
reference_id
reference_type
scores
url http://www.matrixssl.org/news.html
51
reference_url http://www.openssl.org/news/secadv_20130204.txt
reference_id
reference_type
scores
url http://www.openssl.org/news/secadv_20130204.txt
52
reference_url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
53
reference_url http://www.securityfocus.com/bid/57778
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57778
54
reference_url http://www.securitytracker.com/id/1029190
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1029190
55
reference_url http://www.splunk.com/view/SP-CAAAHXG
reference_id
reference_type
scores
url http://www.splunk.com/view/SP-CAAAHXG
56
reference_url http://www.ubuntu.com/usn/USN-1735-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1735-1
57
reference_url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
reference_id 699885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
reference_id 699888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
reference_id 699889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=907589
reference_id 907589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=907589
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
reference_id CVE-2013-0169
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
133
reference_url https://security.gentoo.org/glsa/201310-10
reference_id GLSA-201310-10
reference_type
scores
url https://security.gentoo.org/glsa/201310-10
134
reference_url https://security.gentoo.org/glsa/201312-03
reference_id GLSA-201312-03
reference_type
scores
url https://security.gentoo.org/glsa/201312-03
135
reference_url https://security.gentoo.org/glsa/201401-30
reference_id GLSA-201401-30
reference_type
scores
url https://security.gentoo.org/glsa/201401-30
136
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
137
reference_url https://access.redhat.com/errata/RHSA-2013:0273
reference_id RHSA-2013:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0273
138
reference_url https://access.redhat.com/errata/RHSA-2013:0274
reference_id RHSA-2013:0274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0274
139
reference_url https://access.redhat.com/errata/RHSA-2013:0275
reference_id RHSA-2013:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0275
140
reference_url https://access.redhat.com/errata/RHSA-2013:0531
reference_id RHSA-2013:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0531
141
reference_url https://access.redhat.com/errata/RHSA-2013:0532
reference_id RHSA-2013:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0532
142
reference_url https://access.redhat.com/errata/RHSA-2013:0587
reference_id RHSA-2013:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0587
143
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
144
reference_url https://access.redhat.com/errata/RHSA-2013:0782
reference_id RHSA-2013:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0782
145
reference_url https://access.redhat.com/errata/RHSA-2013:0783
reference_id RHSA-2013:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0783
146
reference_url https://access.redhat.com/errata/RHSA-2013:0822
reference_id RHSA-2013:0822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0822
147
reference_url https://access.redhat.com/errata/RHSA-2013:0823
reference_id RHSA-2013:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0823
148
reference_url https://access.redhat.com/errata/RHSA-2013:0833
reference_id RHSA-2013:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0833
149
reference_url https://access.redhat.com/errata/RHSA-2013:0855
reference_id RHSA-2013:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0855
150
reference_url https://access.redhat.com/errata/RHSA-2013:1013
reference_id RHSA-2013:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1013
151
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
152
reference_url https://access.redhat.com/errata/RHSA-2013:1456
reference_id RHSA-2013:1456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1456
153
reference_url https://access.redhat.com/errata/RHSA-2014:0416
reference_id RHSA-2014:0416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0416
154
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
155
reference_url https://usn.ubuntu.com/1732-1/
reference_id USN-1732-1
reference_type
scores
url https://usn.ubuntu.com/1732-1/
156
reference_url https://usn.ubuntu.com/1732-3/
reference_id USN-1732-3
reference_type
scores
url https://usn.ubuntu.com/1732-3/
157
reference_url https://usn.ubuntu.com/1735-1/
reference_id USN-1735-1
reference_type
scores
url https://usn.ubuntu.com/1735-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-0169
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1m6-r1bv-d7gr
18
url VCID-b3mt-3nfn-suc1
vulnerability_id VCID-b3mt-3nfn-suc1
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
reference_id
reference_type
scores
0
value 0.01567
scoring_system epss
scoring_elements 0.81552
published_at 2026-04-21T12:55:00Z
1
value 0.01567
scoring_system epss
scoring_elements 0.81448
published_at 2026-04-01T12:55:00Z
2
value 0.01567
scoring_system epss
scoring_elements 0.81459
published_at 2026-04-02T12:55:00Z
3
value 0.01567
scoring_system epss
scoring_elements 0.81481
published_at 2026-04-04T12:55:00Z
4
value 0.01567
scoring_system epss
scoring_elements 0.81479
published_at 2026-04-07T12:55:00Z
5
value 0.01567
scoring_system epss
scoring_elements 0.81506
published_at 2026-04-08T12:55:00Z
6
value 0.01567
scoring_system epss
scoring_elements 0.81512
published_at 2026-04-13T12:55:00Z
7
value 0.01567
scoring_system epss
scoring_elements 0.81532
published_at 2026-04-11T12:55:00Z
8
value 0.01567
scoring_system epss
scoring_elements 0.81519
published_at 2026-04-12T12:55:00Z
9
value 0.01567
scoring_system epss
scoring_elements 0.81549
published_at 2026-04-16T12:55:00Z
10
value 0.01567
scoring_system epss
scoring_elements 0.8155
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
reference_id 1060953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
13
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
14
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.4-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1490
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mt-3nfn-suc1
19
url VCID-bfd8-7p4k-abae
vulnerability_id VCID-bfd8-7p4k-abae
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0441
reference_id
reference_type
scores
0
value 0.03581
scoring_system epss
scoring_elements 0.87756
published_at 2026-04-21T12:55:00Z
1
value 0.03581
scoring_system epss
scoring_elements 0.87689
published_at 2026-04-01T12:55:00Z
2
value 0.03581
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-02T12:55:00Z
3
value 0.03581
scoring_system epss
scoring_elements 0.87711
published_at 2026-04-04T12:55:00Z
4
value 0.03581
scoring_system epss
scoring_elements 0.87713
published_at 2026-04-07T12:55:00Z
5
value 0.03581
scoring_system epss
scoring_elements 0.87735
published_at 2026-04-08T12:55:00Z
6
value 0.03581
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-09T12:55:00Z
7
value 0.03581
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-11T12:55:00Z
8
value 0.03581
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-12T12:55:00Z
9
value 0.03581
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-13T12:55:00Z
10
value 0.03581
scoring_system epss
scoring_elements 0.87758
published_at 2026-04-16T12:55:00Z
11
value 0.03581
scoring_system epss
scoring_elements 0.87757
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0441
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827833
reference_id 827833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827833
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441
reference_id CVE-2012-0441
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-39
reference_id mfsa2012-39
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-39
6
reference_url https://access.redhat.com/errata/RHSA-2012:1090
reference_id RHSA-2012:1090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1090
7
reference_url https://access.redhat.com/errata/RHSA-2012:1091
reference_id RHSA-2012:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1091
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
11
reference_url https://usn.ubuntu.com/1540-1/
reference_id USN-1540-1
reference_type
scores
url https://usn.ubuntu.com/1540-1/
12
reference_url https://usn.ubuntu.com/1540-2/
reference_id USN-1540-2
reference_type
scores
url https://usn.ubuntu.com/1540-2/
fixed_packages
0
url pkg:deb/debian/nss@3.13.4-1?distro=trixie
purl pkg:deb/debian/nss@3.13.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.13.4-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2012-0441
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfd8-7p4k-abae
20
url VCID-bhzh-jj66-uudh
vulnerability_id VCID-bhzh-jj66-uudh
summary Multiple vulnerabilities have been discovered in NSS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3479.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3479
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41896
published_at 2026-04-02T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41838
published_at 2026-04-21T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.419
published_at 2026-04-12T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41887
published_at 2026-04-13T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41937
published_at 2026-04-16T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.4191
published_at 2026-04-18T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41924
published_at 2026-04-04T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41851
published_at 2026-04-07T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41901
published_at 2026-04-08T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41911
published_at 2026-04-09T12:55:00Z
10
value 0.00198
scoring_system epss
scoring_elements 0.41935
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3479
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021786
reference_id 1021786
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021786
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134331
reference_id 2134331
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-26T16:06:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2134331
5
reference_url https://security.gentoo.org/glsa/202212-05
reference_id GLSA-202212-05
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-26T16:06:39Z/
url https://security.gentoo.org/glsa/202212-05
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1774654
reference_id show_bug.cgi?id=1774654
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-26T16:06:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1774654
7
reference_url https://usn.ubuntu.com/5892-1/
reference_id USN-5892-1
reference_type
scores
url https://usn.ubuntu.com/5892-1/
fixed_packages
0
url pkg:deb/debian/nss@0?distro=trixie
purl pkg:deb/debian/nss@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@0%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87-1?distro=trixie
purl pkg:deb/debian/nss@2:3.87-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2022-3479
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhzh-jj66-uudh
21
url VCID-cgvg-aj53-kkbp
vulnerability_id VCID-cgvg-aj53-kkbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48125
published_at 2026-04-21T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50528
published_at 2026-04-16T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50485
published_at 2026-04-13T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.505
published_at 2026-04-12T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-11T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50533
published_at 2026-04-18T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-08T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.5043
published_at 2026-04-07T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50477
published_at 2026-04-04T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
reference_id 2170377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
24
reference_url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
reference_id ALAS-2023-1992.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
25
reference_url https://security.gentoo.org/glsa/202305-35
reference_id GLSA-202305-35
reference_type
scores
url https://security.gentoo.org/glsa/202305-35
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
reference_id mfsa2023-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-05/
reference_id mfsa2023-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-05/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
reference_id mfsa2023-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-06/
reference_id mfsa2023-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-06/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
reference_id mfsa2023-07
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-07/
reference_id mfsa2023-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-07/
32
reference_url https://access.redhat.com/errata/RHSA-2023:1252
reference_id RHSA-2023:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1252
33
reference_url https://access.redhat.com/errata/RHSA-2023:1332
reference_id RHSA-2023:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1332
34
reference_url https://access.redhat.com/errata/RHSA-2023:1365
reference_id RHSA-2023:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1365
35
reference_url https://access.redhat.com/errata/RHSA-2023:1366
reference_id RHSA-2023:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1366
36
reference_url https://access.redhat.com/errata/RHSA-2023:1368
reference_id RHSA-2023:1368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1368
37
reference_url https://access.redhat.com/errata/RHSA-2023:1369
reference_id RHSA-2023:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1369
38
reference_url https://access.redhat.com/errata/RHSA-2023:1370
reference_id RHSA-2023:1370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1370
39
reference_url https://access.redhat.com/errata/RHSA-2023:1406
reference_id RHSA-2023:1406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1406
40
reference_url https://access.redhat.com/errata/RHSA-2023:1436
reference_id RHSA-2023:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1436
41
reference_url https://access.redhat.com/errata/RHSA-2023:1442
reference_id RHSA-2023:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1442
42
reference_url https://access.redhat.com/errata/RHSA-2023:1443
reference_id RHSA-2023:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1443
43
reference_url https://access.redhat.com/errata/RHSA-2023:1444
reference_id RHSA-2023:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1444
44
reference_url https://access.redhat.com/errata/RHSA-2023:1445
reference_id RHSA-2023:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1445
45
reference_url https://access.redhat.com/errata/RHSA-2023:1472
reference_id RHSA-2023:1472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1472
46
reference_url https://access.redhat.com/errata/RHSA-2023:1479
reference_id RHSA-2023:1479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1479
47
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
reference_id show_bug.cgi?id=1804640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
49
reference_url https://usn.ubuntu.com/5880-1/
reference_id USN-5880-1
reference_type
scores
url https://usn.ubuntu.com/5880-1/
50
reference_url https://usn.ubuntu.com/5892-1/
reference_id USN-5892-1
reference_type
scores
url https://usn.ubuntu.com/5892-1/
51
reference_url https://usn.ubuntu.com/5892-2/
reference_id USN-5892-2
reference_type
scores
url https://usn.ubuntu.com/5892-2/
52
reference_url https://usn.ubuntu.com/5943-1/
reference_id USN-5943-1
reference_type
scores
url https://usn.ubuntu.com/5943-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.87.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2023-0767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvg-aj53-kkbp
22
url VCID-dh3c-g3k3-zkb7
vulnerability_id VCID-dh3c-g3k3-zkb7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
reference_id
reference_type
scores
0
value 0.03211
scoring_system epss
scoring_elements 0.87046
published_at 2026-04-16T12:55:00Z
1
value 0.03211
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-13T12:55:00Z
2
value 0.03211
scoring_system epss
scoring_elements 0.8705
published_at 2026-04-18T12:55:00Z
3
value 0.03211
scoring_system epss
scoring_elements 0.87047
published_at 2026-04-21T12:55:00Z
4
value 0.03851
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-02T12:55:00Z
5
value 0.03851
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-01T12:55:00Z
6
value 0.03851
scoring_system epss
scoring_elements 0.88166
published_at 2026-04-04T12:55:00Z
7
value 0.03851
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-07T12:55:00Z
8
value 0.03851
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-08T12:55:00Z
9
value 0.03851
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-09T12:55:00Z
10
value 0.03851
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-11T12:55:00Z
11
value 0.03851
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-3998
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3998
15
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
18
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
21
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
reference_id 1471171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
23
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
24
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
reference_id CVE-2017-7805
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
32
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
33
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
37
reference_url https://access.redhat.com/errata/RHSA-2017:2832
reference_id RHSA-2017:2832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2832
38
reference_url https://usn.ubuntu.com/3431-1/
reference_id USN-3431-1
reference_type
scores
url https://usn.ubuntu.com/3431-1/
39
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
40
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.33-1?distro=trixie
purl pkg:deb/debian/nss@2:3.33-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.33-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2017-7805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3c-g3k3-zkb7
23
url VCID-dk4z-1j37-aucx
vulnerability_id VCID-dk4z-1j37-aucx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0591.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0684.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0684.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0685.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0685.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1979.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1979.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1979
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72194
published_at 2026-04-21T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.72113
published_at 2026-04-01T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72159
published_at 2026-04-13T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.722
published_at 2026-04-16T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72209
published_at 2026-04-18T12:55:00Z
5
value 0.00707
scoring_system epss
scoring_elements 0.72119
published_at 2026-04-02T12:55:00Z
6
value 0.00707
scoring_system epss
scoring_elements 0.72139
published_at 2026-04-04T12:55:00Z
7
value 0.00707
scoring_system epss
scoring_elements 0.72117
published_at 2026-04-07T12:55:00Z
8
value 0.00707
scoring_system epss
scoring_elements 0.72153
published_at 2026-04-08T12:55:00Z
9
value 0.00707
scoring_system epss
scoring_elements 0.72165
published_at 2026-04-09T12:55:00Z
10
value 0.00707
scoring_system epss
scoring_elements 0.72188
published_at 2026-04-11T12:55:00Z
11
value 0.00707
scoring_system epss
scoring_elements 0.72172
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1979
11
reference_url https://bto.bluecoat.com/security-advisory/sa124
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa124
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1185033
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1185033
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807
20
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
21
reference_url http://www.debian.org/security/2016/dsa-3576
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3576
22
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
23
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-36.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-36.html
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
25
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
27
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
28
reference_url http://www.securityfocus.com/bid/84221
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84221
29
reference_url http://www.securitytracker.com/id/1035215
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035215
30
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315202
reference_id 1315202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315202
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979
reference_id CVE-2016-1979
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1979
reference_id CVE-2016-1979
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1979
36
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
reference_id mfsa2016-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
38
reference_url https://access.redhat.com/errata/RHSA-2016:0591
reference_id RHSA-2016:0591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0591
39
reference_url https://access.redhat.com/errata/RHSA-2016:0684
reference_id RHSA-2016:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0684
40
reference_url https://access.redhat.com/errata/RHSA-2016:0685
reference_id RHSA-2016:0685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0685
41
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.21-1?distro=trixie
purl pkg:deb/debian/nss@2:3.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.21-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-1979
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk4z-1j37-aucx
24
url VCID-dtrc-mwu9-2bdf
vulnerability_id VCID-dtrc-mwu9-2bdf
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
reference_id
reference_type
scores
0
value 0.0279
scoring_system epss
scoring_elements 0.861
published_at 2026-04-21T12:55:00Z
1
value 0.0279
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-01T12:55:00Z
2
value 0.0279
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-02T12:55:00Z
3
value 0.0279
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-07T12:55:00Z
4
value 0.0279
scoring_system epss
scoring_elements 0.86067
published_at 2026-04-08T12:55:00Z
5
value 0.0279
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-09T12:55:00Z
6
value 0.0279
scoring_system epss
scoring_elements 0.86092
published_at 2026-04-11T12:55:00Z
7
value 0.0279
scoring_system epss
scoring_elements 0.86089
published_at 2026-04-12T12:55:00Z
8
value 0.0279
scoring_system epss
scoring_elements 0.86084
published_at 2026-04-13T12:55:00Z
9
value 0.0279
scoring_system epss
scoring_elements 0.86102
published_at 2026-04-16T12:55:00Z
10
value 0.0279
scoring_system epss
scoring_elements 0.86107
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
reference_id 1030807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://access.redhat.com/errata/RHSA-2013:1840
reference_id RHSA-2013:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1840
10
reference_url https://access.redhat.com/errata/RHSA-2013:1841
reference_id RHSA-2013:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1841
11
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
12
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
13
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
14
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-5605
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrc-mwu9-2bdf
25
url VCID-e1yx-dxa6-1bba
vulnerability_id VCID-e1yx-dxa6-1bba
summary
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
    allowing attackers to cause unspecified impact.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
reference_id
reference_type
scores
0
value 0.03832
scoring_system epss
scoring_elements 0.88172
published_at 2026-04-21T12:55:00Z
1
value 0.03832
scoring_system epss
scoring_elements 0.88174
published_at 2026-04-16T12:55:00Z
2
value 0.03832
scoring_system epss
scoring_elements 0.88099
published_at 2026-04-01T12:55:00Z
3
value 0.03832
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-02T12:55:00Z
4
value 0.03832
scoring_system epss
scoring_elements 0.88124
published_at 2026-04-04T12:55:00Z
5
value 0.03832
scoring_system epss
scoring_elements 0.88131
published_at 2026-04-07T12:55:00Z
6
value 0.03832
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-08T12:55:00Z
7
value 0.03832
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-09T12:55:00Z
8
value 0.03832
scoring_system epss
scoring_elements 0.88165
published_at 2026-04-11T12:55:00Z
9
value 0.03832
scoring_system epss
scoring_elements 0.88159
published_at 2026-04-12T12:55:00Z
10
value 0.03832
scoring_system epss
scoring_elements 0.8816
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
2
reference_url https://curl.se/docs/CVE-2011-3389.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2011-3389.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737506
reference_id 737506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737506
6
reference_url https://security.gentoo.org/glsa/201111-02
reference_id GLSA-201111-02
reference_type
scores
url https://security.gentoo.org/glsa/201111-02
7
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
8
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
9
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
10
reference_url https://access.redhat.com/errata/RHSA-2011:1380
reference_id RHSA-2011:1380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1380
11
reference_url https://access.redhat.com/errata/RHSA-2011:1384
reference_id RHSA-2011:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1384
12
reference_url https://access.redhat.com/errata/RHSA-2012:0006
reference_id RHSA-2012:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0006
13
reference_url https://access.redhat.com/errata/RHSA-2012:0034
reference_id RHSA-2012:0034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0034
14
reference_url https://access.redhat.com/errata/RHSA-2012:0343
reference_id RHSA-2012:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0343
15
reference_url https://access.redhat.com/errata/RHSA-2012:0508
reference_id RHSA-2012:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0508
16
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
17
reference_url https://usn.ubuntu.com/1263-1/
reference_id USN-1263-1
reference_type
scores
url https://usn.ubuntu.com/1263-1/
fixed_packages
0
url pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1?distro=trixie
purl pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.13.1.with.ckbi.1.88-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2011-3389
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba
26
url VCID-ekxy-vaed-u7cg
vulnerability_id VCID-ekxy-vaed-u7cg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird the worst of which could lead to the execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79116
published_at 2026-04-18T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-08T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-09T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-21T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.79101
published_at 2026-04-12T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-13T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.79119
published_at 2026-04-16T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79041
published_at 2026-04-01T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79047
published_at 2026-04-02T12:55:00Z
9
value 0.01221
scoring_system epss
scoring_elements 0.79074
published_at 2026-04-04T12:55:00Z
10
value 0.01221
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.debian.org/security/2016/dsa-3730
reference_id
reference_type
scores
url https://www.debian.org/security/2016/dsa-3730
13
reference_url https://www.mozilla.org/security/advisories/mfsa2016-89/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-89/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2016-90/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-90/
15
reference_url https://www.mozilla.org/security/advisories/mfsa2016-93/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-93/
16
reference_url http://www.securityfocus.com/bid/94341
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94341
17
reference_url http://www.securitytracker.com/id/1037298
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
reference_id 1396548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
reference_id CVE-2016-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
23
reference_url https://security.gentoo.org/glsa/201701-15
reference_id GLSA-201701-15
reference_type
scores
url https://security.gentoo.org/glsa/201701-15
24
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
reference_id mfsa2016-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
reference_id mfsa2016-90
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
reference_id mfsa2016-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
28
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1?distro=trixie
purl pkg:deb/debian/nss@2:3.26.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-9074
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ekxy-vaed-u7cg
27
url VCID-ewe9-39b1-kba2
vulnerability_id VCID-ewe9-39b1-kba2
summary
A vulnerability in NSS might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27152
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27192
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27229
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27091
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27137
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27141
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-13T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27049
published_at 2026-04-16T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27024
published_at 2026-04-18T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
reference_id 1887319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
5
reference_url https://security.gentoo.org/glsa/202012-21
reference_id GLSA-202012-21
reference_type
scores
url https://security.gentoo.org/glsa/202012-21
6
reference_url https://access.redhat.com/errata/RHSA-2021:1384
reference_id RHSA-2021:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1384
7
reference_url https://access.redhat.com/errata/RHSA-2021:3572
reference_id RHSA-2021:3572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3572
8
reference_url https://usn.ubuntu.com/5410-1/
reference_id USN-5410-1
reference_type
scores
url https://usn.ubuntu.com/5410-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.58-1?distro=trixie
purl pkg:deb/debian/nss@2:3.58-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.58-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-25648
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewe9-39b1-kba2
28
url VCID-fgv4-bz59-h7g7
vulnerability_id VCID-fgv4-bz59-h7g7
summary
Multiple vulnerabilities have been found in Mozilla Network
    Security Service (NSS), the worst of which may lead to arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
reference_id
reference_type
scores
0
value 0.00558
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-01T12:55:00Z
1
value 0.00558
scoring_system epss
scoring_elements 0.68165
published_at 2026-04-02T12:55:00Z
2
value 0.00558
scoring_system epss
scoring_elements 0.68183
published_at 2026-04-04T12:55:00Z
3
value 0.00558
scoring_system epss
scoring_elements 0.68161
published_at 2026-04-07T12:55:00Z
4
value 0.00558
scoring_system epss
scoring_elements 0.68212
published_at 2026-04-08T12:55:00Z
5
value 0.00558
scoring_system epss
scoring_elements 0.68228
published_at 2026-04-09T12:55:00Z
6
value 0.00558
scoring_system epss
scoring_elements 0.68253
published_at 2026-04-11T12:55:00Z
7
value 0.00558
scoring_system epss
scoring_elements 0.6824
published_at 2026-04-12T12:55:00Z
8
value 0.00558
scoring_system epss
scoring_elements 0.68206
published_at 2026-04-13T12:55:00Z
9
value 0.00558
scoring_system epss
scoring_elements 0.68245
published_at 2026-04-16T12:55:00Z
10
value 0.00558
scoring_system epss
scoring_elements 0.68255
published_at 2026-04-18T12:55:00Z
11
value 0.00558
scoring_system epss
scoring_elements 0.68236
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
reference_id 1671310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
reference_id 921614
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
6
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
7
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
8
reference_url https://usn.ubuntu.com/3898-1/
reference_id USN-3898-1
reference_type
scores
url https://usn.ubuntu.com/3898-1/
9
reference_url https://usn.ubuntu.com/3898-2/
reference_id USN-3898-2
reference_type
scores
url https://usn.ubuntu.com/3898-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.42.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2018-18508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgv4-bz59-h7g7
29
url VCID-frwk-mbxe-jbhp
vulnerability_id VCID-frwk-mbxe-jbhp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2404.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2404
reference_id
reference_type
scores
0
value 0.21024
scoring_system epss
scoring_elements 0.95655
published_at 2026-04-21T12:55:00Z
1
value 0.21024
scoring_system epss
scoring_elements 0.95606
published_at 2026-04-01T12:55:00Z
2
value 0.21024
scoring_system epss
scoring_elements 0.95615
published_at 2026-04-02T12:55:00Z
3
value 0.21024
scoring_system epss
scoring_elements 0.9562
published_at 2026-04-04T12:55:00Z
4
value 0.21024
scoring_system epss
scoring_elements 0.95623
published_at 2026-04-07T12:55:00Z
5
value 0.21024
scoring_system epss
scoring_elements 0.95631
published_at 2026-04-08T12:55:00Z
6
value 0.21024
scoring_system epss
scoring_elements 0.95635
published_at 2026-04-09T12:55:00Z
7
value 0.21024
scoring_system epss
scoring_elements 0.9564
published_at 2026-04-12T12:55:00Z
8
value 0.21024
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-13T12:55:00Z
9
value 0.21024
scoring_system epss
scoring_elements 0.9565
published_at 2026-04-16T12:55:00Z
10
value 0.21024
scoring_system epss
scoring_elements 0.95654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2404
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512912
reference_id 512912
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512912
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934
reference_id 539934
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404
reference_id CVE-2009-2404
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-43
reference_id mfsa2009-43
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-43
7
reference_url https://access.redhat.com/errata/RHSA-2009:1184
reference_id RHSA-2009:1184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1184
8
reference_url https://access.redhat.com/errata/RHSA-2009:1185
reference_id RHSA-2009:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1185
9
reference_url https://access.redhat.com/errata/RHSA-2009:1186
reference_id RHSA-2009:1186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1186
10
reference_url https://access.redhat.com/errata/RHSA-2009:1190
reference_id RHSA-2009:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1190
11
reference_url https://access.redhat.com/errata/RHSA-2009:1207
reference_id RHSA-2009:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1207
12
reference_url https://usn.ubuntu.com/810-1/
reference_id USN-810-1
reference_type
scores
url https://usn.ubuntu.com/810-1/
fixed_packages
0
url pkg:deb/debian/nss@3.12.3-1?distro=trixie
purl pkg:deb/debian/nss@3.12.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2009-2404
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frwk-mbxe-jbhp
30
url VCID-fxjm-ywug-f3d5
vulnerability_id VCID-fxjm-ywug-f3d5
summary
references
0
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
reference_id mfsa2026-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
1
reference_url https://www.mozilla.org/security/advisories/mfsa2026-30/
reference_id mfsa2026-30
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-30/
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
reference_id mfsa2026-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
3
reference_url https://www.mozilla.org/security/advisories/mfsa2026-31/
reference_id mfsa2026-31
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-31/
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
reference_id mfsa2026-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
5
reference_url https://www.mozilla.org/security/advisories/mfsa2026-32/
reference_id mfsa2026-32
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-32/
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-33/
reference_id mfsa2026-33
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-33/
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-34/
reference_id mfsa2026-34
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-34/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2023209
reference_id show_bug.cgi?id=2023209
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T18:03:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2023209
fixed_packages
0
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2026-6767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxjm-ywug-f3d5
31
url VCID-fz23-zbk9-gugq
vulnerability_id VCID-fz23-zbk9-gugq
summary
Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,
    including the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2409.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2409
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81887
published_at 2026-04-01T12:55:00Z
1
value 0.01642
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-02T12:55:00Z
2
value 0.01642
scoring_system epss
scoring_elements 0.81921
published_at 2026-04-04T12:55:00Z
3
value 0.01642
scoring_system epss
scoring_elements 0.81917
published_at 2026-04-07T12:55:00Z
4
value 0.01642
scoring_system epss
scoring_elements 0.81943
published_at 2026-04-08T12:55:00Z
5
value 0.01642
scoring_system epss
scoring_elements 0.81951
published_at 2026-04-09T12:55:00Z
6
value 0.01642
scoring_system epss
scoring_elements 0.81971
published_at 2026-04-11T12:55:00Z
7
value 0.01642
scoring_system epss
scoring_elements 0.8196
published_at 2026-04-12T12:55:00Z
8
value 0.01642
scoring_system epss
scoring_elements 0.81954
published_at 2026-04-13T12:55:00Z
9
value 0.02215
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-16T12:55:00Z
10
value 0.02215
scoring_system epss
scoring_elements 0.84498
published_at 2026-04-18T12:55:00Z
11
value 0.02215
scoring_system epss
scoring_elements 0.845
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510197
reference_id 510197
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510197
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539895
reference_id 539895
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539895
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539899
reference_id 539899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539899
6
reference_url https://security.gentoo.org/glsa/200911-02
reference_id GLSA-200911-02
reference_type
scores
url https://security.gentoo.org/glsa/200911-02
7
reference_url https://security.gentoo.org/glsa/200912-01
reference_id GLSA-200912-01
reference_type
scores
url https://security.gentoo.org/glsa/200912-01
8
reference_url https://access.redhat.com/errata/RHSA-2009:1184
reference_id RHSA-2009:1184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1184
9
reference_url https://access.redhat.com/errata/RHSA-2009:1186
reference_id RHSA-2009:1186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1186
10
reference_url https://access.redhat.com/errata/RHSA-2009:1190
reference_id RHSA-2009:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1190
11
reference_url https://access.redhat.com/errata/RHSA-2009:1207
reference_id RHSA-2009:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1207
12
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
13
reference_url https://access.redhat.com/errata/RHSA-2009:1560
reference_id RHSA-2009:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1560
14
reference_url https://access.redhat.com/errata/RHSA-2009:1571
reference_id RHSA-2009:1571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1571
15
reference_url https://access.redhat.com/errata/RHSA-2009:1584
reference_id RHSA-2009:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1584
16
reference_url https://access.redhat.com/errata/RHSA-2009:1662
reference_id RHSA-2009:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1662
17
reference_url https://access.redhat.com/errata/RHSA-2010:0054
reference_id RHSA-2010:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0054
18
reference_url https://usn.ubuntu.com/809-1/
reference_id USN-809-1
reference_type
scores
url https://usn.ubuntu.com/809-1/
19
reference_url https://usn.ubuntu.com/810-1/
reference_id USN-810-1
reference_type
scores
url https://usn.ubuntu.com/810-1/
20
reference_url https://usn.ubuntu.com/830-1/
reference_id USN-830-1
reference_type
scores
url https://usn.ubuntu.com/830-1/
21
reference_url https://usn.ubuntu.com/859-1/
reference_id USN-859-1
reference_type
scores
url https://usn.ubuntu.com/859-1/
fixed_packages
0
url pkg:deb/debian/nss@3.12.3-1?distro=trixie
purl pkg:deb/debian/nss@3.12.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2009-2409
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz23-zbk9-gugq
32
url VCID-gfj6-dsud-g3fh
vulnerability_id VCID-gfj6-dsud-g3fh
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77777
published_at 2026-04-21T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-08T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-09T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77765
published_at 2026-04-11T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77749
published_at 2026-04-12T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-13T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-16T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77784
published_at 2026-04-18T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77689
published_at 2026-04-01T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-02T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-04T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77706
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3831
30
reference_url https://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3872
31
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
32
reference_url https://www.mozilla.org/security/advisories/mfsa2017-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-11/
33
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
34
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
35
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
36
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
reference_id 1443348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
reference_id CVE-2017-5462
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
45
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
46
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
51
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
52
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
purl pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2017-5462
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfj6-dsud-g3fh
33
url VCID-gret-hn3p-5kbk
vulnerability_id VCID-gret-hn3p-5kbk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19277
published_at 2026-04-21T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19267
published_at 2026-04-18T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19259
published_at 2026-04-16T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-02T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19266
published_at 2026-04-07T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19549
published_at 2026-04-04T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19297
published_at 2026-04-13T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19353
published_at 2026-04-12T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19402
published_at 2026-04-11T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19397
published_at 2026-04-09T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19345
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
reference_id 2303148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
23
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
reference_id show_bug.cgi?id=1905691
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
24
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:deb/debian/nss@0?distro=trixie
purl pkg:deb/debian/nss@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@0%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.103-1?distro=trixie
purl pkg:deb/debian/nss@2:3.103-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.103-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2024-7531
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gret-hn3p-5kbk
34
url VCID-hk2m-rbdy-nqhc
vulnerability_id VCID-hk2m-rbdy-nqhc
summary
references
0
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
reference_id mfsa2026-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-30
1
reference_url https://www.mozilla.org/security/advisories/mfsa2026-30/
reference_id mfsa2026-30
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://www.mozilla.org/security/advisories/mfsa2026-30/
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
reference_id mfsa2026-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
3
reference_url https://www.mozilla.org/security/advisories/mfsa2026-31/
reference_id mfsa2026-31
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://www.mozilla.org/security/advisories/mfsa2026-31/
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
reference_id mfsa2026-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-32
5
reference_url https://www.mozilla.org/security/advisories/mfsa2026-32/
reference_id mfsa2026-32
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://www.mozilla.org/security/advisories/mfsa2026-32/
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-33/
reference_id mfsa2026-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://www.mozilla.org/security/advisories/mfsa2026-33/
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-34/
reference_id mfsa2026-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://www.mozilla.org/security/advisories/mfsa2026-34/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2026089
reference_id show_bug.cgi?id=2026089
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-21T19:40:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2026089
fixed_packages
0
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2026-6772
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hk2m-rbdy-nqhc
35
url VCID-hs5f-21nx-gfeb
vulnerability_id VCID-hs5f-21nx-gfeb
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67999
published_at 2026-04-21T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67991
published_at 2026-04-09T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.68015
published_at 2026-04-11T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.68001
published_at 2026-04-12T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.67967
published_at 2026-04-13T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.68004
published_at 2026-04-16T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.68017
published_at 2026-04-18T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67907
published_at 2026-04-01T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.6793
published_at 2026-04-02T12:55:00Z
9
value 0.0055
scoring_system epss
scoring_elements 0.67949
published_at 2026-04-04T12:55:00Z
10
value 0.0055
scoring_system epss
scoring_elements 0.67927
published_at 2026-04-07T12:55:00Z
11
value 0.0055
scoring_system epss
scoring_elements 0.67978
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
reference_id 1728437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
15
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
16
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
17
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
18
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.45-1?distro=trixie
purl pkg:deb/debian/nss@2:3.45-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.45-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-11729
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs5f-21nx-gfeb
36
url VCID-hs79-pemh-vfd6
vulnerability_id VCID-hs79-pemh-vfd6
summary nss: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9574
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.4011
published_at 2026-04-21T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40218
published_at 2026-04-16T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40188
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.402
published_at 2026-04-02T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40225
published_at 2026-04-04T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40147
published_at 2026-04-07T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40201
published_at 2026-04-08T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40212
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9574
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1404568
reference_id 1404568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1404568
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9574
reference_id CVE-2016-9574
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9574
fixed_packages
0
url pkg:deb/debian/nss@2:3.25-1?distro=trixie
purl pkg:deb/debian/nss@2:3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-9574
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs79-pemh-vfd6
37
url VCID-jau7-gfz8-dkfa
vulnerability_id VCID-jau7-gfz8-dkfa
summary The renegotiation vulnerability in SSL protocol
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html
1
reference_url http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
2
reference_url http://blogs.iss.net/archive/sslmitmiscsrf.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blogs.iss.net/archive/sslmitmiscsrf.html
3
reference_url http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during
4
reference_url http://clicky.me/tlsvuln
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://clicky.me/tlsvuln
5
reference_url http://extendedsubset.com/?p=8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://extendedsubset.com/?p=8
6
reference_url http://extendedsubset.com/Renegotiating_TLS.pdf
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://extendedsubset.com/Renegotiating_TLS.pdf
7
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686
8
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041
9
reference_url http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
10
reference_url http://kbase.redhat.com/faq/docs/DOC-20491
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://kbase.redhat.com/faq/docs/DOC-20491
11
reference_url http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
12
reference_url http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
13
reference_url http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
14
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
15
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
16
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
17
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
18
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
19
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
20
reference_url http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
26
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
27
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html
28
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
29
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
30
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
31
reference_url http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
32
reference_url http://marc.info/?l=bugtraq&m=126150535619567&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=126150535619567&w=2
33
reference_url http://marc.info/?l=bugtraq&m=127128920008563&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=127128920008563&w=2
34
reference_url http://marc.info/?l=bugtraq&m=127419602507642&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=127419602507642&w=2
35
reference_url http://marc.info/?l=bugtraq&m=127557596201693&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=127557596201693&w=2
36
reference_url http://marc.info/?l=bugtraq&m=130497311408250&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=130497311408250&w=2
37
reference_url http://marc.info/?l=bugtraq&m=132077688910227&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=132077688910227&w=2
38
reference_url http://marc.info/?l=bugtraq&m=133469267822771&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=133469267822771&w=2
39
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
40
reference_url http://marc.info/?l=bugtraq&m=142660345230545&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=142660345230545&w=2
41
reference_url http://marc.info/?l=cryptography&m=125752275331877&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=cryptography&m=125752275331877&w=2
42
reference_url http://openbsd.org/errata45.html#010_openssl
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openbsd.org/errata45.html#010_openssl
43
reference_url http://openbsd.org/errata46.html#004_openssl
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openbsd.org/errata46.html#004_openssl
44
reference_url https://access.redhat.com/errata/RHSA-2009:1579
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2009:1579
45
reference_url https://access.redhat.com/errata/RHSA-2009:1580
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2009:1580
46
reference_url https://access.redhat.com/errata/RHSA-2009:1694
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2009:1694
47
reference_url https://access.redhat.com/errata/RHSA-2010:0011
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0011
48
reference_url https://access.redhat.com/errata/RHSA-2010:0119
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0119
49
reference_url https://access.redhat.com/errata/RHSA-2010:0130
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0130
50
reference_url https://access.redhat.com/errata/RHSA-2010:0155
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0155
51
reference_url https://access.redhat.com/errata/RHSA-2010:0162
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0162
52
reference_url https://access.redhat.com/errata/RHSA-2010:0163
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0163
53
reference_url https://access.redhat.com/errata/RHSA-2010:0164
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0164
54
reference_url https://access.redhat.com/errata/RHSA-2010:0165
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0165
55
reference_url https://access.redhat.com/errata/RHSA-2010:0166
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0166
56
reference_url https://access.redhat.com/errata/RHSA-2010:0167
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0167
57
reference_url https://access.redhat.com/errata/RHSA-2010:0337
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0337
58
reference_url https://access.redhat.com/errata/RHSA-2010:0338
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0338
59
reference_url https://access.redhat.com/errata/RHSA-2010:0339
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0339
60
reference_url https://access.redhat.com/errata/RHSA-2010:0408
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0408
61
reference_url https://access.redhat.com/errata/RHSA-2010:0440
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0440
62
reference_url https://access.redhat.com/errata/RHSA-2010:0768
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0768
63
reference_url https://access.redhat.com/errata/RHSA-2010:0770
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0770
64
reference_url https://access.redhat.com/errata/RHSA-2010:0786
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0786
65
reference_url https://access.redhat.com/errata/RHSA-2010:0807
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0807
66
reference_url https://access.redhat.com/errata/RHSA-2010:0865
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0865
67
reference_url https://access.redhat.com/errata/RHSA-2010:0986
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0986
68
reference_url https://access.redhat.com/errata/RHSA-2010:0987
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2010:0987
69
reference_url https://access.redhat.com/errata/RHSA-2011:0880
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2011:0880
70
reference_url https://access.redhat.com/errata/RHSA-2015:1591
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2015:1591
71
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3555.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3555.json
72
reference_url https://access.redhat.com/security/cve/CVE-2009-3555
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2009-3555
73
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3555
reference_id
reference_type
scores
0
value 0.01971
scoring_system epss
scoring_elements 0.83576
published_at 2026-04-21T12:55:00Z
1
value 0.02288
scoring_system epss
scoring_elements 0.84686
published_at 2026-04-08T12:55:00Z
2
value 0.02288
scoring_system epss
scoring_elements 0.84628
published_at 2026-04-01T12:55:00Z
3
value 0.02288
scoring_system epss
scoring_elements 0.84642
published_at 2026-04-02T12:55:00Z
4
value 0.02288
scoring_system epss
scoring_elements 0.84662
published_at 2026-04-04T12:55:00Z
5
value 0.02288
scoring_system epss
scoring_elements 0.84664
published_at 2026-04-07T12:55:00Z
6
value 0.02288
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-09T12:55:00Z
7
value 0.02288
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-11T12:55:00Z
8
value 0.02288
scoring_system epss
scoring_elements 0.84707
published_at 2026-04-12T12:55:00Z
9
value 0.02288
scoring_system epss
scoring_elements 0.84701
published_at 2026-04-13T12:55:00Z
10
value 0.02288
scoring_system epss
scoring_elements 0.84722
published_at 2026-04-16T12:55:00Z
11
value 0.02288
scoring_system epss
scoring_elements 0.84723
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3555
74
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=526689
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.mozilla.org/show_bug.cgi?id=526689
75
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=545755
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.mozilla.org/show_bug.cgi?id=545755
76
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=533125
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=533125
77
reference_url https://bz.apache.org/bugzilla/show_bug.cgi?id=50325
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bz.apache.org/bugzilla/show_bug.cgi?id=50325
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
81
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049
82
reference_url http://seclists.org/fulldisclosure/2009/Nov/139
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2009/Nov/139
83
reference_url http://security.gentoo.org/glsa/glsa-200912-01.xml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://security.gentoo.org/glsa/glsa-200912-01.xml
84
reference_url http://security.gentoo.org/glsa/glsa-201203-22.xml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://security.gentoo.org/glsa/glsa-201203-22.xml
85
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://security.gentoo.org/glsa/glsa-201406-32.xml
86
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/54158
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/54158
87
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
88
reference_url https://github.com/apache/tomcat55/commit/359c7ee17f5759cc99988e1cc9e971fe4a6ffad5
reference_id
reference_type
scores
url https://github.com/apache/tomcat55/commit/359c7ee17f5759cc99988e1cc9e971fe4a6ffad5
89
reference_url https://github.com/apache/tomcat/commit/14e4efd925da58b9fa63f20969fb7349b8a9c30d
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/14e4efd925da58b9fa63f20969fb7349b8a9c30d
90
reference_url https://github.com/apache/tomcat/commit/2d4ca03acc27cc883c404d1745d92f983b6fada3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/2d4ca03acc27cc883c404d1745d92f983b6fada3
91
reference_url https://github.com/apache/tomcat/commit/30af3f5630542a2340781f66553e734a6fd69701
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/30af3f5630542a2340781f66553e734a6fd69701
92
reference_url https://github.com/apache/tomcat/commit/328a523cbb2a2d4cd55283180614d4e03e2f8f02
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/328a523cbb2a2d4cd55283180614d4e03e2f8f02
93
reference_url https://github.com/apache/tomcat/commit/3d315ac9dfaa2c03b4df82938d78bf5b755766b3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/3d315ac9dfaa2c03b4df82938d78bf5b755766b3
94
reference_url https://github.com/apache/tomcat/commit/56f67141e82e16f68a860c3af9b7342da35cbe7d
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/56f67141e82e16f68a860c3af9b7342da35cbe7d
95
reference_url https://github.com/apache/tomcat/commit/b4e9488629bf03b4b65abf335e536e85386d1366
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/b4e9488629bf03b4b65abf335e536e85386d1366
96
reference_url https://github.com/apache/tomcat/commit/df9633116b5fec8f47f1f008fb89a6e9d5895cd0
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/df9633116b5fec8f47f1f008fb89a6e9d5895cd0
97
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
98
reference_url https://kb.bluecoat.com/index?page=content&id=SA50
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://kb.bluecoat.com/index?page=content&id=SA50
99
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446
100
reference_url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@<dev.tomcat.apache.org>
101
reference_url https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@<dev.tomcat.apache.org>
102
reference_url https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@<dev.tomcat.apache.org>
103
reference_url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@<dev.tomcat.apache.org>
104
reference_url https://nginx.org/download/patch.cve-2009-3555.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.cve-2009-3555.txt
105
reference_url https://nginx.org/download/patch.cve-2009-3555.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.cve-2009-3555.txt.asc
106
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10088
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10088
107
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11578
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11578
108
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11617
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11617
109
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7315
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7315
110
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7478
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7478
111
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7973
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7973
112
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8366
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8366
113
reference_url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8535
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8535
114
reference_url https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html
115
reference_url https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
116
reference_url https://tomcat.apache.org/security-5.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-5.html
117
reference_url https://tomcat.apache.org/security-6.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-6.html
118
reference_url https://tomcat.apache.org/security-7.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-7.html
119
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1
120
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1
121
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1
122
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1
123
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1
124
reference_url http://support.apple.com/kb/HT4004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.apple.com/kb/HT4004
125
reference_url http://support.apple.com/kb/HT4170
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.apple.com/kb/HT4170
126
reference_url http://support.apple.com/kb/HT4171
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.apple.com/kb/HT4171
127
reference_url http://support.avaya.com/css/P8/documents/100070150
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.avaya.com/css/P8/documents/100070150
128
reference_url http://support.avaya.com/css/P8/documents/100081611
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.avaya.com/css/P8/documents/100081611
129
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.avaya.com/css/P8/documents/100114315
130
reference_url http://support.avaya.com/css/P8/documents/100114327
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.avaya.com/css/P8/documents/100114327
131
reference_url http://support.citrix.com/article/CTX123359
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.citrix.com/article/CTX123359
132
reference_url http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
133
reference_url http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
134
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
135
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
136
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
137
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html
138
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
139
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
140
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html
141
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html
142
reference_url http://sysoev.ru/nginx/patch.cve-2009-3555.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://sysoev.ru/nginx/patch.cve-2009-3555.txt
143
reference_url http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
144
reference_url http://ubuntu.com/usn/usn-923-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://ubuntu.com/usn/usn-923-1
145
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0155
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://wiki.rpath.com/Advisories:rPSA-2009-0155
146
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848
147
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054
148
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055
149
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
150
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21426108
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg21426108
151
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21432298
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg21432298
152
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg24006386
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg24006386
153
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg24025312
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-01.ibm.com/support/docview.wss?uid=swg24025312
154
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only
155
reference_url http://www.arubanetworks.com/support/alerts/aid-020810.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.arubanetworks.com/support/alerts/aid-020810.txt
156
reference_url http://www.betanews.com/article/1257452450
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.betanews.com/article/1257452450
157
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml
158
reference_url http://www.debian.org/security/2009/dsa-1934
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2009/dsa-1934
159
reference_url http://www.debian.org/security/2011/dsa-2141
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2011/dsa-2141
160
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3253
161
reference_url http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
162
reference_url http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
163
reference_url http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
164
reference_url http://www.ietf.org/mail-archive/web/tls/current/msg03948.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ietf.org/mail-archive/web/tls/current/msg03948.html
165
reference_url http://www.ingate.com/Relnote.php?ver=481
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ingate.com/Relnote.php?ver=481
166
reference_url http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
167
reference_url http://www.kb.cert.org/vuls/id/120541
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.kb.cert.org/vuls/id/120541
168
reference_url http://www.links.org/?p=780
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.links.org/?p=780
169
reference_url http://www.links.org/?p=786
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.links.org/?p=786
170
reference_url http://www.links.org/?p=789
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.links.org/?p=789
171
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
172
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
173
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
174
reference_url http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
175
reference_url http://www.openoffice.org/security/cves/CVE-2009-3555.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openoffice.org/security/cves/CVE-2009-3555.html
176
reference_url http://www.openssl.org/news/secadv_20091111.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openssl.org/news/secadv_20091111.txt
177
reference_url http://www.openwall.com/lists/oss-security/2009/11/05/3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/05/3
178
reference_url http://www.openwall.com/lists/oss-security/2009/11/05/5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/05/5
179
reference_url http://www.openwall.com/lists/oss-security/2009/11/06/3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/06/3
180
reference_url http://www.openwall.com/lists/oss-security/2009/11/07/3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/07/3
181
reference_url http://www.openwall.com/lists/oss-security/2009/11/20/1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/20/1
182
reference_url http://www.openwall.com/lists/oss-security/2009/11/23/10
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2009/11/23/10
183
reference_url http://www.opera.com/docs/changelogs/unix/1060
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.opera.com/docs/changelogs/unix/1060
184
reference_url http://www.opera.com/support/search/view/944
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.opera.com/support/search/view/944
185
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
186
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
187
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
188
reference_url http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c
189
reference_url http://www.redhat.com/support/errata/RHSA-2010-0119.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0119.html
190
reference_url http://www.redhat.com/support/errata/RHSA-2010-0130.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0130.html
191
reference_url http://www.redhat.com/support/errata/RHSA-2010-0155.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0155.html
192
reference_url http://www.redhat.com/support/errata/RHSA-2010-0165.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0165.html
193
reference_url http://www.redhat.com/support/errata/RHSA-2010-0167.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0167.html
194
reference_url http://www.redhat.com/support/errata/RHSA-2010-0337.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0337.html
195
reference_url http://www.redhat.com/support/errata/RHSA-2010-0338.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0338.html
196
reference_url http://www.redhat.com/support/errata/RHSA-2010-0339.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0339.html
197
reference_url http://www.redhat.com/support/errata/RHSA-2010-0768.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0768.html
198
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
199
reference_url http://www.redhat.com/support/errata/RHSA-2010-0786.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0786.html
200
reference_url http://www.redhat.com/support/errata/RHSA-2010-0807.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0807.html
201
reference_url http://www.redhat.com/support/errata/RHSA-2010-0865.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0865.html
202
reference_url http://www.redhat.com/support/errata/RHSA-2010-0986.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0986.html
203
reference_url http://www.redhat.com/support/errata/RHSA-2010-0987.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2010-0987.html
204
reference_url http://www.redhat.com/support/errata/RHSA-2011-0880.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.redhat.com/support/errata/RHSA-2011-0880.html
205
reference_url http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html
206
reference_url http://www.tombom.co.uk/blog/?p=85
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.tombom.co.uk/blog/?p=85
207
reference_url http://www.ubuntu.com/usn/USN-1010-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1010-1
208
reference_url http://www.ubuntu.com/usn/USN-927-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-927-1
209
reference_url http://www.ubuntu.com/usn/USN-927-4
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-927-4
210
reference_url http://www.ubuntu.com/usn/USN-927-5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-927-5
211
reference_url http://www.us-cert.gov/cas/techalerts/TA10-222A.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.us-cert.gov/cas/techalerts/TA10-222A.html
212
reference_url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
213
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
214
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
215
reference_url http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
216
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765649
reference_id 765649
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765649
217
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10579.py
reference_id CVE-2009-3555
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10579.py
218
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-3555
reference_id CVE-2009-3555
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2009-3555
219
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10071.txt
reference_id CVE-2009-3555;OSVDB-59970
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10071.txt
220
reference_url https://www.securityfocus.com/bid/35888/info
reference_id CVE-2009-3555;OSVDB-59970
reference_type exploit
scores
url https://www.securityfocus.com/bid/35888/info
221
reference_url https://github.com/advisories/GHSA-f7w7-6pjc-wwm6
reference_id GHSA-f7w7-6pjc-wwm6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f7w7-6pjc-wwm6
222
reference_url https://security.gentoo.org/glsa/200912-01
reference_id GLSA-200912-01
reference_type
scores
url https://security.gentoo.org/glsa/200912-01
223
reference_url https://security.gentoo.org/glsa/201006-18
reference_id GLSA-201006-18
reference_type
scores
url https://security.gentoo.org/glsa/201006-18
224
reference_url https://security.gentoo.org/glsa/201110-05
reference_id GLSA-201110-05
reference_type
scores
url https://security.gentoo.org/glsa/201110-05
225
reference_url https://security.gentoo.org/glsa/201203-22
reference_id GLSA-201203-22
reference_type
scores
url https://security.gentoo.org/glsa/201203-22
226
reference_url https://security.gentoo.org/glsa/201206-18
reference_id GLSA-201206-18
reference_type
scores
url https://security.gentoo.org/glsa/201206-18
227
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
228
reference_url https://security.gentoo.org/glsa/201309-15
reference_id GLSA-201309-15
reference_type
scores
url https://security.gentoo.org/glsa/201309-15
229
reference_url https://security.gentoo.org/glsa/201311-13
reference_id GLSA-201311-13
reference_type
scores
url https://security.gentoo.org/glsa/201311-13
230
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
231
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-22
reference_id mfsa2010-22
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-22
232
reference_url https://usn.ubuntu.com/1010-1/
reference_id USN-1010-1
reference_type
scores
url https://usn.ubuntu.com/1010-1/
233
reference_url https://usn.ubuntu.com/860-1/
reference_id USN-860-1
reference_type
scores
url https://usn.ubuntu.com/860-1/
234
reference_url https://usn.ubuntu.com/923-1/
reference_id USN-923-1
reference_type
scores
url https://usn.ubuntu.com/923-1/
235
reference_url https://usn.ubuntu.com/927-1/
reference_id USN-927-1
reference_type
scores
url https://usn.ubuntu.com/927-1/
236
reference_url https://usn.ubuntu.com/927-4/
reference_id USN-927-4
reference_type
scores
url https://usn.ubuntu.com/927-4/
237
reference_url https://usn.ubuntu.com/927-6/
reference_id USN-927-6
reference_type
scores
url https://usn.ubuntu.com/927-6/
238
reference_url https://usn.ubuntu.com/990-1/
reference_id USN-990-1
reference_type
scores
url https://usn.ubuntu.com/990-1/
239
reference_url https://usn.ubuntu.com/990-2/
reference_id USN-990-2
reference_type
scores
url https://usn.ubuntu.com/990-2/
fixed_packages
0
url pkg:deb/debian/nss@3.12.6-1?distro=trixie
purl pkg:deb/debian/nss@3.12.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.6-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2009-3555, GHSA-f7w7-6pjc-wwm6, VU#120541
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jau7-gfz8-dkfa
38
url VCID-jm5w-6pdb-bbes
vulnerability_id VCID-jm5w-6pdb-bbes
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
reference_id
reference_type
scores
0
value 0.00661
scoring_system epss
scoring_elements 0.71171
published_at 2026-04-21T12:55:00Z
1
value 0.00661
scoring_system epss
scoring_elements 0.71092
published_at 2026-04-01T12:55:00Z
2
value 0.00661
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-02T12:55:00Z
3
value 0.00661
scoring_system epss
scoring_elements 0.71119
published_at 2026-04-04T12:55:00Z
4
value 0.00661
scoring_system epss
scoring_elements 0.71094
published_at 2026-04-07T12:55:00Z
5
value 0.00661
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-08T12:55:00Z
6
value 0.00661
scoring_system epss
scoring_elements 0.71148
published_at 2026-04-09T12:55:00Z
7
value 0.00661
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-11T12:55:00Z
8
value 0.00661
scoring_system epss
scoring_elements 0.71157
published_at 2026-04-12T12:55:00Z
9
value 0.00661
scoring_system epss
scoring_elements 0.71141
published_at 2026-04-13T12:55:00Z
10
value 0.00661
scoring_system epss
scoring_elements 0.71187
published_at 2026-04-16T12:55:00Z
11
value 0.00661
scoring_system epss
scoring_elements 0.71193
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
reference_id 1031457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
14
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-5606
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm5w-6pdb-bbes
39
url VCID-jmhk-12t1-kugh
vulnerability_id VCID-jmhk-12t1-kugh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45529
published_at 2026-04-21T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.4544
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45514
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45536
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45482
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-08T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45538
published_at 2026-04-09T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45558
published_at 2026-04-11T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45527
published_at 2026-04-12T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-13T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45581
published_at 2026-04-16T12:55:00Z
11
value 0.00228
scoring_system epss
scoring_elements 0.45578
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
reference_id 1236954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
reference_id mfsa2015-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
7
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
8
reference_url https://access.redhat.com/errata/RHSA-2015:1699
reference_id RHSA-2015:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1699
9
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
10
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
11
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.19.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-2730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh
40
url VCID-jrsz-ynp7-wbb2
vulnerability_id VCID-jrsz-ynp7-wbb2
summary Multiple vulnerabilities have been discovered in NSS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
reference_id
reference_type
scores
0
value 0.05243
scoring_system epss
scoring_elements 0.89991
published_at 2026-04-18T12:55:00Z
1
value 0.05243
scoring_system epss
scoring_elements 0.8999
published_at 2026-04-16T12:55:00Z
2
value 0.05243
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-13T12:55:00Z
3
value 0.05243
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-12T12:55:00Z
4
value 0.05243
scoring_system epss
scoring_elements 0.89984
published_at 2026-04-11T12:55:00Z
5
value 0.05243
scoring_system epss
scoring_elements 0.89976
published_at 2026-04-09T12:55:00Z
6
value 0.05243
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-08T12:55:00Z
7
value 0.05243
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-07T12:55:00Z
8
value 0.05267
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-21T12:55:00Z
9
value 0.0538
scoring_system epss
scoring_elements 0.90065
published_at 2026-04-01T12:55:00Z
10
value 0.0538
scoring_system epss
scoring_elements 0.90068
published_at 2026-04-02T12:55:00Z
11
value 0.0538
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
reference_id 2024370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
5
reference_url https://security.archlinux.org/ASA-202112-3
reference_id ASA-202112-3
reference_type
scores
url https://security.archlinux.org/ASA-202112-3
6
reference_url https://security.archlinux.org/ASA-202112-4
reference_id ASA-202112-4
reference_type
scores
url https://security.archlinux.org/ASA-202112-4
7
reference_url https://security.archlinux.org/AVG-2596
reference_id AVG-2596
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2596
8
reference_url https://security.archlinux.org/AVG-2597
reference_id AVG-2597
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2597
9
reference_url https://security.gentoo.org/glsa/202212-05
reference_id GLSA-202212-05
reference_type
scores
url https://security.gentoo.org/glsa/202212-05
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
reference_id mfsa2021-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
11
reference_url https://access.redhat.com/errata/RHSA-2021:4903
reference_id RHSA-2021:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4903
12
reference_url https://access.redhat.com/errata/RHSA-2021:4904
reference_id RHSA-2021:4904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4904
13
reference_url https://access.redhat.com/errata/RHSA-2021:4907
reference_id RHSA-2021:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4907
14
reference_url https://access.redhat.com/errata/RHSA-2021:4909
reference_id RHSA-2021:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4909
15
reference_url https://access.redhat.com/errata/RHSA-2021:4919
reference_id RHSA-2021:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4919
16
reference_url https://access.redhat.com/errata/RHSA-2021:4932
reference_id RHSA-2021:4932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4932
17
reference_url https://access.redhat.com/errata/RHSA-2021:4933
reference_id RHSA-2021:4933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4933
18
reference_url https://access.redhat.com/errata/RHSA-2021:4946
reference_id RHSA-2021:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4946
19
reference_url https://access.redhat.com/errata/RHSA-2021:4953
reference_id RHSA-2021:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4953
20
reference_url https://access.redhat.com/errata/RHSA-2021:4954
reference_id RHSA-2021:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4954
21
reference_url https://access.redhat.com/errata/RHSA-2021:4969
reference_id RHSA-2021:4969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4969
22
reference_url https://access.redhat.com/errata/RHSA-2021:4994
reference_id RHSA-2021:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4994
23
reference_url https://access.redhat.com/errata/RHSA-2021:5006
reference_id RHSA-2021:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5006
24
reference_url https://access.redhat.com/errata/RHSA-2021:5035
reference_id RHSA-2021:5035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5035
25
reference_url https://usn.ubuntu.com/5168-1/
reference_id USN-5168-1
reference_type
scores
url https://usn.ubuntu.com/5168-1/
26
reference_url https://usn.ubuntu.com/5168-2/
reference_id USN-5168-2
reference_type
scores
url https://usn.ubuntu.com/5168-2/
27
reference_url https://usn.ubuntu.com/5168-3/
reference_id USN-5168-3
reference_type
scores
url https://usn.ubuntu.com/5168-3/
28
reference_url https://usn.ubuntu.com/5168-4/
reference_id USN-5168-4
reference_type
scores
url https://usn.ubuntu.com/5168-4/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.73-1?distro=trixie
purl pkg:deb/debian/nss@2:3.73-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.73-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2021-43527
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrsz-ynp7-wbb2
41
url VCID-jvrr-2gej-bfby
vulnerability_id VCID-jvrr-2gej-bfby
summary nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
reference_id
reference_type
scores
0
value 0.00622
scoring_system epss
scoring_elements 0.70029
published_at 2026-04-01T12:55:00Z
1
value 0.00622
scoring_system epss
scoring_elements 0.70041
published_at 2026-04-02T12:55:00Z
2
value 0.00622
scoring_system epss
scoring_elements 0.70056
published_at 2026-04-04T12:55:00Z
3
value 0.00622
scoring_system epss
scoring_elements 0.70034
published_at 2026-04-07T12:55:00Z
4
value 0.00622
scoring_system epss
scoring_elements 0.70081
published_at 2026-04-08T12:55:00Z
5
value 0.00622
scoring_system epss
scoring_elements 0.70097
published_at 2026-04-09T12:55:00Z
6
value 0.00622
scoring_system epss
scoring_elements 0.7012
published_at 2026-04-11T12:55:00Z
7
value 0.00622
scoring_system epss
scoring_elements 0.70106
published_at 2026-04-12T12:55:00Z
8
value 0.00622
scoring_system epss
scoring_elements 0.70093
published_at 2026-04-13T12:55:00Z
9
value 0.00622
scoring_system epss
scoring_elements 0.70136
published_at 2026-04-16T12:55:00Z
10
value 0.00622
scoring_system epss
scoring_elements 0.70146
published_at 2026-04-18T12:55:00Z
11
value 0.00622
scoring_system epss
scoring_elements 0.70125
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
reference_id 1622089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
reference_id 908332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
6
reference_url https://access.redhat.com/errata/RHSA-2018:2768
reference_id RHSA-2018:2768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2768
7
reference_url https://access.redhat.com/errata/RHSA-2018:2898
reference_id RHSA-2018:2898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2898
8
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
9
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.39-1?distro=trixie
purl pkg:deb/debian/nss@2:3.39-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.39-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2018-12384
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvrr-2gej-bfby
42
url VCID-k2s2-zkua-8ydy
vulnerability_id VCID-k2s2-zkua-8ydy
summary
NSS has an information disclosure vulnerability when handling DSA
    keys.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26682
published_at 2026-04-21T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26836
published_at 2026-04-09T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-11T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26794
published_at 2026-04-12T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-13T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-16T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26717
published_at 2026-04-18T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26854
published_at 2026-04-01T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26895
published_at 2026-04-02T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.2693
published_at 2026-04-04T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26718
published_at 2026-04-07T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26787
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
reference_id 1826177
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
reference_id 961752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
13
reference_url https://security.archlinux.org/ASA-202006-1
reference_id ASA-202006-1
reference_type
scores
url https://security.archlinux.org/ASA-202006-1
14
reference_url https://security.archlinux.org/ASA-202006-4
reference_id ASA-202006-4
reference_type
scores
url https://security.archlinux.org/ASA-202006-4
15
reference_url https://security.archlinux.org/AVG-1173
reference_id AVG-1173
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1173
16
reference_url https://security.archlinux.org/AVG-1179
reference_id AVG-1179
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1179
17
reference_url https://security.gentoo.org/glsa/202007-49
reference_id GLSA-202007-49
reference_type
scores
url https://security.gentoo.org/glsa/202007-49
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
reference_id mfsa2020-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
reference_id mfsa2020-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
reference_id mfsa2020-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
21
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
22
reference_url https://usn.ubuntu.com/4383-1/
reference_id USN-4383-1
reference_type
scores
url https://usn.ubuntu.com/4383-1/
23
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
24
reference_url https://usn.ubuntu.com/4397-2/
reference_id USN-4397-2
reference_type
scores
url https://usn.ubuntu.com/4397-2/
25
reference_url https://usn.ubuntu.com/4421-1/
reference_id USN-4421-1
reference_type
scores
url https://usn.ubuntu.com/4421-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.53-1?distro=trixie
purl pkg:deb/debian/nss@2:3.53-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.53-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2s2-zkua-8ydy
43
url VCID-k4a4-f1as-x3bj
vulnerability_id VCID-k4a4-f1as-x3bj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35033
published_at 2026-04-21T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35094
published_at 2026-04-16T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.3508
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34934
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
11
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
reference_id 1853983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.55-1?distro=trixie
purl pkg:deb/debian/nss@2:3.55-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.55-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj
44
url VCID-k8ap-r7e3-cuem
vulnerability_id VCID-k8ap-r7e3-cuem
summary
Multiple vulnerabilities have been found in OpenSSL, the worst
    allowing remote attackers to decrypt TLS sessions.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
18
reference_url http://marc.info/?l=bugtraq&m=145983526810210&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145983526810210&w=2
19
reference_url http://marc.info/?l=bugtraq&m=146108058503441&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=146108058503441&w=2
20
reference_url http://marc.info/?l=bugtraq&m=146133665209436&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=146133665209436&w=2
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-1519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1519.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0800.json
23
reference_url https://access.redhat.com/security/vulnerabilities/drown
reference_id
reference_type
scores
url https://access.redhat.com/security/vulnerabilities/drown
24
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0800
reference_id
reference_type
scores
0
value 0.90348
scoring_system epss
scoring_elements 0.99601
published_at 2026-04-04T12:55:00Z
1
value 0.90348
scoring_system epss
scoring_elements 0.99603
published_at 2026-04-13T12:55:00Z
2
value 0.90348
scoring_system epss
scoring_elements 0.99604
published_at 2026-04-21T12:55:00Z
3
value 0.90348
scoring_system epss
scoring_elements 0.996
published_at 2026-04-01T12:55:00Z
4
value 0.90348
scoring_system epss
scoring_elements 0.99602
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0800
25
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
26
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
28
reference_url https://drownattack.com
reference_id
reference_type
scores
url https://drownattack.com
29
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
30
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
31
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
32
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
33
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
34
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953
35
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
36
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554
37
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
38
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
39
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765
40
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589
41
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
42
reference_url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
43
reference_url https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03
reference_id
reference_type
scores
url https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03
44
reference_url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
reference_id
reference_type
scores
url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
45
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10154
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10154
46
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
reference_id
reference_type
scores
url https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
47
reference_url https://security.netapp.com/advisory/ntap-20160301-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160301-0001/
48
reference_url http://support.citrix.com/article/CTX208403
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX208403
49
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18
50
reference_url https://www.kb.cert.org/vuls/id/583776
reference_id
reference_type
scores
url https://www.kb.cert.org/vuls/id/583776
51
reference_url https://www.openssl.org/news/secadv/20160301.txt
reference_id
reference_type
scores
url https://www.openssl.org/news/secadv/20160301.txt
52
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
53
reference_url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en
reference_id
reference_type
scores
url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en
54
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
55
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
56
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
57
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
58
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
59
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
60
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
61
reference_url http://www.securityfocus.com/bid/83733
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83733
62
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
63
reference_url http://www.securitytracker.com/id/1035133
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035133
64
reference_url http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf
reference_id
reference_type
scores
url http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1310593
reference_id 1310593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1310593
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pulsesecure:client:-:*:*:*:*:iphone_os:*:*
reference_id cpe:2.3:a:pulsesecure:client:-:*:*:*:*:iphone_os:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pulsesecure:client:-:*:*:*:*:iphone_os:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pulsesecure:steel_belted_radius:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pulsesecure:steel_belted_radius:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pulsesecure:steel_belted_radius:-:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0800
reference_id CVE-2016-0800
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0800
101
reference_url https://security.gentoo.org/glsa/201603-15
reference_id GLSA-201603-15
reference_type
scores
url https://security.gentoo.org/glsa/201603-15
102
reference_url https://access.redhat.com/errata/RHSA-2016:0301
reference_id RHSA-2016:0301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0301
103
reference_url https://access.redhat.com/errata/RHSA-2016:0302
reference_id RHSA-2016:0302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0302
104
reference_url https://access.redhat.com/errata/RHSA-2016:0303
reference_id RHSA-2016:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0303
105
reference_url https://access.redhat.com/errata/RHSA-2016:0304
reference_id RHSA-2016:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0304
106
reference_url https://access.redhat.com/errata/RHSA-2016:0305
reference_id RHSA-2016:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0305
107
reference_url https://access.redhat.com/errata/RHSA-2016:0306
reference_id RHSA-2016:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0306
108
reference_url https://access.redhat.com/errata/RHSA-2016:0372
reference_id RHSA-2016:0372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0372
109
reference_url https://access.redhat.com/errata/RHSA-2016:0379
reference_id RHSA-2016:0379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0379
110
reference_url https://access.redhat.com/errata/RHSA-2016:0445
reference_id RHSA-2016:0445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0445
111
reference_url https://access.redhat.com/errata/RHSA-2016:0446
reference_id RHSA-2016:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0446
112
reference_url https://access.redhat.com/errata/RHSA-2016:0490
reference_id RHSA-2016:0490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0490
113
reference_url https://access.redhat.com/errata/RHSA-2016:1519
reference_id RHSA-2016:1519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1519
fixed_packages
0
url pkg:deb/debian/nss@3.13?distro=trixie
purl pkg:deb/debian/nss@3.13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.13%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-0800
risk_score 10.0
exploitability 2.0
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8ap-r7e3-cuem
45
url VCID-kxvg-qw8v-vydv
vulnerability_id VCID-kxvg-qw8v-vydv
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.76043
published_at 2026-04-21T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-18T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.76055
published_at 2026-04-16T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.75956
published_at 2026-04-01T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.76015
published_at 2026-04-13T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.76021
published_at 2026-04-12T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-11T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.76019
published_at 2026-04-09T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.76004
published_at 2026-04-08T12:55:00Z
9
value 0.00925
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-07T12:55:00Z
10
value 0.00925
scoring_system epss
scoring_elements 0.75992
published_at 2026-04-04T12:55:00Z
11
value 0.00925
scoring_system epss
scoring_elements 0.75959
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
30
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
31
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
32
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
37
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
38
reference_url http://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3831
39
reference_url http://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3872
40
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
42
reference_url http://www.securityfocus.com/bid/98050
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98050
43
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
reference_id 1440080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
45
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
46
reference_url https://security.archlinux.org/ASA-201704-4
reference_id ASA-201704-4
reference_type
scores
url https://security.archlinux.org/ASA-201704-4
47
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
48
reference_url https://security.archlinux.org/ASA-201705-21
reference_id ASA-201705-21
reference_type
scores
url https://security.archlinux.org/ASA-201705-21
49
reference_url https://security.archlinux.org/AVG-247
reference_id AVG-247
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-247
50
reference_url https://security.archlinux.org/AVG-248
reference_id AVG-248
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-248
51
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
reference_id CVE-2017-5461
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
54
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
55
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
60
reference_url https://access.redhat.com/errata/RHSA-2017:1100
reference_id RHSA-2017:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1100
61
reference_url https://access.redhat.com/errata/RHSA-2017:1101
reference_id RHSA-2017:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1101
62
reference_url https://access.redhat.com/errata/RHSA-2017:1102
reference_id RHSA-2017:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1102
63
reference_url https://access.redhat.com/errata/RHSA-2017:1103
reference_id RHSA-2017:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1103
64
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
65
reference_url https://usn.ubuntu.com/3270-1/
reference_id USN-3270-1
reference_type
scores
url https://usn.ubuntu.com/3270-1/
66
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
67
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
purl pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2017-5461
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvg-qw8v-vydv
46
url VCID-mwjm-p7pr-kfhj
vulnerability_id VCID-mwjm-p7pr-kfhj
summary nss: false start PR_Recv information disclosure security issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1740.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1740
reference_id
reference_type
scores
0
value 0.01001
scoring_system epss
scoring_elements 0.76939
published_at 2026-04-01T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.76945
published_at 2026-04-02T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.76975
published_at 2026-04-04T12:55:00Z
3
value 0.01001
scoring_system epss
scoring_elements 0.76957
published_at 2026-04-07T12:55:00Z
4
value 0.01001
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-08T12:55:00Z
5
value 0.01001
scoring_system epss
scoring_elements 0.77
published_at 2026-04-09T12:55:00Z
6
value 0.01001
scoring_system epss
scoring_elements 0.77027
published_at 2026-04-11T12:55:00Z
7
value 0.01001
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-12T12:55:00Z
8
value 0.01001
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-13T12:55:00Z
9
value 0.01001
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-16T12:55:00Z
10
value 0.01001
scoring_system epss
scoring_elements 0.77044
published_at 2026-04-18T12:55:00Z
11
value 0.01001
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1053725
reference_id 1053725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1053725
4
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
5
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
6
reference_url https://usn.ubuntu.com/2088-1/
reference_id USN-2088-1
reference_type
scores
url https://usn.ubuntu.com/2088-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.4-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-1740
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwjm-p7pr-kfhj
47
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69706
published_at 2026-04-21T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
9
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
10
value 0.00607
scoring_system epss
scoring_elements 0.69717
published_at 2026-04-16T12:55:00Z
11
value 0.00607
scoring_system epss
scoring_elements 0.69725
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.19.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
48
url VCID-mx8t-s47w-wud5
vulnerability_id VCID-mx8t-s47w-wud5
summary When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.69054
published_at 2026-04-18T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-13T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.69045
published_at 2026-04-16T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-01T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68978
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68957
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69027
published_at 2026-04-09T12:55:00Z
9
value 0.00584
scoring_system epss
scoring_elements 0.69049
published_at 2026-04-11T12:55:00Z
10
value 0.00584
scoring_system epss
scoring_elements 0.69034
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
reference_id 1826187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
6
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
7
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
10
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.55-1?distro=trixie
purl pkg:deb/debian/nss@2:3.55-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.55-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5
49
url VCID-paez-g9wh-mfeq
vulnerability_id VCID-paez-g9wh-mfeq
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-21T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.6862
published_at 2026-04-02T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68638
published_at 2026-04-04T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68614
published_at 2026-04-07T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-08T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.68683
published_at 2026-04-09T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68707
published_at 2026-04-16T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68694
published_at 2026-04-12T12:55:00Z
8
value 0.00572
scoring_system epss
scoring_elements 0.68664
published_at 2026-04-13T12:55:00Z
9
value 0.00572
scoring_system epss
scoring_elements 0.68717
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
reference_id show_bug.cgi?id=1839258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
9
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.101-1?distro=trixie
purl pkg:deb/debian/nss@2:3.101-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.101-1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2024-6609
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-paez-g9wh-mfeq
50
url VCID-pc13-zwmr-p7hz
vulnerability_id VCID-pc13-zwmr-p7hz
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61508
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61582
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61612
published_at 2026-04-04T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61583
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61631
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61667
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61656
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61636
published_at 2026-04-13T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61678
published_at 2026-04-16T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61684
published_at 2026-04-18T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61668
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
reference_id 1391818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.25-1?distro=trixie
purl pkg:deb/debian/nss@2:3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-8635
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pc13-zwmr-p7hz
51
url VCID-qdev-8m9n-8bbr
vulnerability_id VCID-qdev-8m9n-8bbr
summary security update
references
0
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
1
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
2
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
3
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1307.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1307.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1354.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1354.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1371.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1371.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
reference_id
reference_type
scores
0
value 0.30935
scoring_system epss
scoring_elements 0.9675
published_at 2026-04-21T12:55:00Z
1
value 0.30935
scoring_system epss
scoring_elements 0.96734
published_at 2026-04-12T12:55:00Z
2
value 0.30935
scoring_system epss
scoring_elements 0.96737
published_at 2026-04-13T12:55:00Z
3
value 0.30935
scoring_system epss
scoring_elements 0.96743
published_at 2026-04-16T12:55:00Z
4
value 0.30935
scoring_system epss
scoring_elements 0.96747
published_at 2026-04-18T12:55:00Z
5
value 0.30935
scoring_system epss
scoring_elements 0.96718
published_at 2026-04-04T12:55:00Z
6
value 0.30935
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-07T12:55:00Z
7
value 0.30935
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-08T12:55:00Z
8
value 0.30935
scoring_system epss
scoring_elements 0.96731
published_at 2026-04-09T12:55:00Z
9
value 0.34437
scoring_system epss
scoring_elements 0.96962
published_at 2026-04-01T12:55:00Z
10
value 0.34437
scoring_system epss
scoring_elements 0.9697
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
15
reference_url http://secunia.com/advisories/61540
reference_id
reference_type
scores
url http://secunia.com/advisories/61540
16
reference_url http://secunia.com/advisories/61574
reference_id
reference_type
scores
url http://secunia.com/advisories/61574
17
reference_url http://secunia.com/advisories/61575
reference_id
reference_type
scores
url http://secunia.com/advisories/61575
18
reference_url http://secunia.com/advisories/61576
reference_id
reference_type
scores
url http://secunia.com/advisories/61576
19
reference_url http://secunia.com/advisories/61583
reference_id
reference_type
scores
url http://secunia.com/advisories/61583
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
21
reference_url http://www.debian.org/security/2014/dsa-3033
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3033
22
reference_url http://www.debian.org/security/2014/dsa-3034
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3034
23
reference_url http://www.debian.org/security/2014/dsa-3037
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3037
24
reference_url http://www.kb.cert.org/vuls/id/772676
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/772676
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
26
reference_url http://www.novell.com/support/kb/doc.php?id=7015701
reference_id
reference_type
scores
url http://www.novell.com/support/kb/doc.php?id=7015701
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
29
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
31
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
32
reference_url http://www.securityfocus.com/bid/70116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70116
33
reference_url http://www.ubuntu.com/usn/USN-2360-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-1
34
reference_url http://www.ubuntu.com/usn/USN-2360-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-2
35
reference_url http://www.ubuntu.com/usn/USN-2361-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2361-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
reference_id 1145429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
reference_id CVE-2014-1568
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
270
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
271
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
reference_id mfsa2014-73
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
272
reference_url https://access.redhat.com/errata/RHSA-2014:1307
reference_id RHSA-2014:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1307
273
reference_url https://access.redhat.com/errata/RHSA-2014:1354
reference_id RHSA-2014:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1354
274
reference_url https://access.redhat.com/errata/RHSA-2014:1371
reference_id RHSA-2014:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1371
275
reference_url https://usn.ubuntu.com/2360-1/
reference_id USN-2360-1
reference_type
scores
url https://usn.ubuntu.com/2360-1/
276
reference_url https://usn.ubuntu.com/2360-2/
reference_id USN-2360-2
reference_type
scores
url https://usn.ubuntu.com/2360-2/
277
reference_url https://usn.ubuntu.com/2361-1/
reference_id USN-2361-1
reference_type
scores
url https://usn.ubuntu.com/2361-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.17.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1568
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr
52
url VCID-qdqz-admy-e7cg
vulnerability_id VCID-qdqz-admy-e7cg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
reference_id
reference_type
scores
0
value 0.00528
scoring_system epss
scoring_elements 0.67194
published_at 2026-04-21T12:55:00Z
1
value 0.00528
scoring_system epss
scoring_elements 0.67093
published_at 2026-04-01T12:55:00Z
2
value 0.00528
scoring_system epss
scoring_elements 0.6713
published_at 2026-04-02T12:55:00Z
3
value 0.00528
scoring_system epss
scoring_elements 0.67153
published_at 2026-04-04T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67128
published_at 2026-04-07T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67178
published_at 2026-04-08T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67191
published_at 2026-04-09T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.6721
published_at 2026-04-11T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67196
published_at 2026-04-12T12:55:00Z
9
value 0.00528
scoring_system epss
scoring_elements 0.67166
published_at 2026-04-13T12:55:00Z
10
value 0.00528
scoring_system epss
scoring_elements 0.67202
published_at 2026-04-16T12:55:00Z
11
value 0.00528
scoring_system epss
scoring_elements 0.67214
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
reference_id 1060955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
14
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
16
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
17
reference_url https://access.redhat.com/errata/RHSA-2014:0979
reference_id RHSA-2014:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0979
18
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
19
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
20
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.4-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqz-admy-e7cg
53
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-18T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81226
published_at 2026-04-21T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
8
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
9
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.21-1?distro=trixie
purl pkg:deb/debian/nss@2:3.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.21-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
54
url VCID-rk7t-zjzg-eqar
vulnerability_id VCID-rk7t-zjzg-eqar
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40504
published_at 2026-04-21T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40613
published_at 2026-04-16T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40582
published_at 2026-04-18T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-01T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40595
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40544
published_at 2026-04-07T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40604
published_at 2026-04-09T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-12T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
reference_id 1851294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.55-1?distro=trixie
purl pkg:deb/debian/nss@2:3.55-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.55-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12401
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar
55
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93743
scoring_system epss
scoring_elements 0.99852
published_at 2026-04-21T12:55:00Z
2
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
3
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
4
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99877
published_at 2026-04-18T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
7
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
8
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.19.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.19.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
56
url VCID-sucm-cq7u-r3en
vulnerability_id VCID-sucm-cq7u-r3en
summary nss: Information exposure when DH secret are reused across multiple TLS connections
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12413.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12413
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50356
published_at 2026-04-01T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50411
published_at 2026-04-02T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-21T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-11T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50458
published_at 2026-04-12T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50443
published_at 2026-04-13T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50486
published_at 2026-04-16T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-18T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50441
published_at 2026-04-04T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50393
published_at 2026-04-07T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50447
published_at 2026-04-08T12:55:00Z
11
value 0.0027
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877557
reference_id 1877557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877557
5
reference_url https://raccoon-attack.com/
reference_id raccoon-attack.com
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-19T15:23:13Z/
url https://raccoon-attack.com/
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
reference_id show_bug.cgi?id=CVE-2020-12413
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-19T15:23:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
fixed_packages
0
url pkg:deb/debian/nss@2:3.17-1?distro=trixie
purl pkg:deb/debian/nss@2:3.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12413
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sucm-cq7u-r3en
57
url VCID-szzk-wxm2-cfgj
vulnerability_id VCID-szzk-wxm2-cfgj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-01T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70344
published_at 2026-04-02T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70361
published_at 2026-04-04T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-07T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70385
published_at 2026-04-08T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.704
published_at 2026-04-09T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-11T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70408
published_at 2026-04-12T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70394
published_at 2026-04-13T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.70436
published_at 2026-04-16T12:55:00Z
10
value 0.00635
scoring_system epss
scoring_elements 0.70445
published_at 2026-04-18T12:55:00Z
11
value 0.00635
scoring_system epss
scoring_elements 0.70425
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
reference_id 1868931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
6
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
7
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
11
reference_url https://usn.ubuntu.com/4476-1/
reference_id USN-4476-1
reference_type
scores
url https://usn.ubuntu.com/4476-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.55-1?distro=trixie
purl pkg:deb/debian/nss@2:3.55-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.55-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12403
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szzk-wxm2-cfgj
58
url VCID-t89f-eksr-juen
vulnerability_id VCID-t89f-eksr-juen
summary nss: Null pointer dereference when handling empty SSLv2 messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
reference_id
reference_type
scores
0
value 0.02085
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-01T12:55:00Z
1
value 0.02085
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-08T12:55:00Z
2
value 0.02085
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-02T12:55:00Z
3
value 0.02085
scoring_system epss
scoring_elements 0.8397
published_at 2026-04-04T12:55:00Z
4
value 0.02085
scoring_system epss
scoring_elements 0.83972
published_at 2026-04-07T12:55:00Z
5
value 0.02085
scoring_system epss
scoring_elements 0.84002
published_at 2026-04-09T12:55:00Z
6
value 0.02085
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-11T12:55:00Z
7
value 0.02085
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-12T12:55:00Z
8
value 0.02098
scoring_system epss
scoring_elements 0.84073
published_at 2026-04-18T12:55:00Z
9
value 0.02098
scoring_system epss
scoring_elements 0.84075
published_at 2026-04-21T12:55:00Z
10
value 0.02098
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-13T12:55:00Z
11
value 0.02098
scoring_system epss
scoring_elements 0.84071
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
reference_id 1446631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
reference_id 863839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
8
reference_url https://access.redhat.com/errata/RHSA-2017:1364
reference_id RHSA-2017:1364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1364
9
reference_url https://access.redhat.com/errata/RHSA-2017:1365
reference_id RHSA-2017:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1365
10
reference_url https://access.redhat.com/errata/RHSA-2017:1567
reference_id RHSA-2017:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1567
11
reference_url https://usn.ubuntu.com/3336-1/
reference_id USN-3336-1
reference_type
scores
url https://usn.ubuntu.com/3336-1/
12
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
purl pkg:deb/debian/nss@2:3.26.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2017-7502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t89f-eksr-juen
59
url VCID-tqc3-eb8c-q3f9
vulnerability_id VCID-tqc3-eb8c-q3f9
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
3
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1135.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1135.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1144.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1144.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1620.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1620.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1620
reference_id
reference_type
scores
0
value 0.00808
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-21T12:55:00Z
1
value 0.00808
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-01T12:55:00Z
2
value 0.00808
scoring_system epss
scoring_elements 0.74158
published_at 2026-04-02T12:55:00Z
3
value 0.00808
scoring_system epss
scoring_elements 0.74184
published_at 2026-04-04T12:55:00Z
4
value 0.00808
scoring_system epss
scoring_elements 0.74157
published_at 2026-04-07T12:55:00Z
5
value 0.00808
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-08T12:55:00Z
6
value 0.00808
scoring_system epss
scoring_elements 0.74205
published_at 2026-04-09T12:55:00Z
7
value 0.00808
scoring_system epss
scoring_elements 0.74226
published_at 2026-04-11T12:55:00Z
8
value 0.00808
scoring_system epss
scoring_elements 0.74208
published_at 2026-04-12T12:55:00Z
9
value 0.00808
scoring_system epss
scoring_elements 0.74201
published_at 2026-04-13T12:55:00Z
10
value 0.00808
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-16T12:55:00Z
11
value 0.00808
scoring_system epss
scoring_elements 0.74248
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1620
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620
9
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
10
reference_url http://security.gentoo.org/glsa/glsa-201406-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-19.xml
11
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
12
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
13
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
14
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
16
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
17
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/57777
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57777
19
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
20
reference_url http://www.ubuntu.com/usn/USN-1763-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1763-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
reference_id 699888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=908234
reference_id 908234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=908234
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1620
reference_id CVE-2013-1620
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1620
50
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
51
reference_url https://access.redhat.com/errata/RHSA-2013:1135
reference_id RHSA-2013:1135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1135
52
reference_url https://access.redhat.com/errata/RHSA-2013:1144
reference_id RHSA-2013:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1144
53
reference_url https://access.redhat.com/errata/RHSA-2013:1181
reference_id RHSA-2013:1181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1181
54
reference_url https://usn.ubuntu.com/1763-1/
reference_id USN-1763-1
reference_type
scores
url https://usn.ubuntu.com/1763-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-1620
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqc3-eb8c-q3f9
60
url VCID-ukuz-m6d3-5kab
vulnerability_id VCID-ukuz-m6d3-5kab
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
reference_id
reference_type
scores
0
value 0.01626
scoring_system epss
scoring_elements 0.81796
published_at 2026-04-01T12:55:00Z
1
value 0.01626
scoring_system epss
scoring_elements 0.81806
published_at 2026-04-02T12:55:00Z
2
value 0.01626
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-04T12:55:00Z
3
value 0.01626
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-07T12:55:00Z
4
value 0.01626
scoring_system epss
scoring_elements 0.81852
published_at 2026-04-08T12:55:00Z
5
value 0.01626
scoring_system epss
scoring_elements 0.81859
published_at 2026-04-09T12:55:00Z
6
value 0.01626
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-11T12:55:00Z
7
value 0.01626
scoring_system epss
scoring_elements 0.81866
published_at 2026-04-12T12:55:00Z
8
value 0.01626
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-13T12:55:00Z
9
value 0.01626
scoring_system epss
scoring_elements 0.81897
published_at 2026-04-18T12:55:00Z
10
value 0.01626
scoring_system epss
scoring_elements 0.81899
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
reference_id 1383883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.25-1?distro=trixie
purl pkg:deb/debian/nss@2:3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-5285
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukuz-m6d3-5kab
61
url VCID-uqv9-vr1q-6ya1
vulnerability_id VCID-uqv9-vr1q-6ya1
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1739
reference_id
reference_type
scores
0
value 0.0287
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-21T12:55:00Z
1
value 0.0287
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-01T12:55:00Z
2
value 0.0287
scoring_system epss
scoring_elements 0.86215
published_at 2026-04-02T12:55:00Z
3
value 0.0287
scoring_system epss
scoring_elements 0.86232
published_at 2026-04-07T12:55:00Z
4
value 0.0287
scoring_system epss
scoring_elements 0.86251
published_at 2026-04-08T12:55:00Z
5
value 0.0287
scoring_system epss
scoring_elements 0.86262
published_at 2026-04-09T12:55:00Z
6
value 0.0287
scoring_system epss
scoring_elements 0.86276
published_at 2026-04-11T12:55:00Z
7
value 0.0287
scoring_system epss
scoring_elements 0.86274
published_at 2026-04-12T12:55:00Z
8
value 0.0287
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-13T12:55:00Z
9
value 0.0287
scoring_system epss
scoring_elements 0.86285
published_at 2026-04-16T12:55:00Z
10
value 0.0287
scoring_system epss
scoring_elements 0.8629
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012740
reference_id 1012740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012740
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726473
reference_id 726473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726473
5
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
reference_id mfsa2013-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
10
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
11
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.15.2-1?distro=trixie
purl pkg:deb/debian/nss@2:3.15.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.15.2-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-1739
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqv9-vr1q-6ya1
62
url VCID-uytp-sf6j-xyf6
vulnerability_id VCID-uytp-sf6j-xyf6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2408.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2408
reference_id
reference_type
scores
0
value 0.01855
scoring_system epss
scoring_elements 0.83057
published_at 2026-04-21T12:55:00Z
1
value 0.01855
scoring_system epss
scoring_elements 0.83054
published_at 2026-04-18T12:55:00Z
2
value 0.02503
scoring_system epss
scoring_elements 0.85286
published_at 2026-04-02T12:55:00Z
3
value 0.02503
scoring_system epss
scoring_elements 0.85305
published_at 2026-04-04T12:55:00Z
4
value 0.02503
scoring_system epss
scoring_elements 0.85307
published_at 2026-04-07T12:55:00Z
5
value 0.02503
scoring_system epss
scoring_elements 0.85329
published_at 2026-04-08T12:55:00Z
6
value 0.02503
scoring_system epss
scoring_elements 0.85351
published_at 2026-04-11T12:55:00Z
7
value 0.02503
scoring_system epss
scoring_elements 0.85349
published_at 2026-04-12T12:55:00Z
8
value 0.02503
scoring_system epss
scoring_elements 0.85346
published_at 2026-04-13T12:55:00Z
9
value 0.02503
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-09T12:55:00Z
10
value 0.02503
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-01T12:55:00Z
11
value 0.03361
scoring_system epss
scoring_elements 0.87363
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2408
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510251
reference_id 510251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510251
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934
reference_id 539934
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408
reference_id CVE-2009-2408
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-42
reference_id mfsa2009-42
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-42
7
reference_url https://access.redhat.com/errata/RHSA-2009:1184
reference_id RHSA-2009:1184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1184
8
reference_url https://access.redhat.com/errata/RHSA-2009:1186
reference_id RHSA-2009:1186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1186
9
reference_url https://access.redhat.com/errata/RHSA-2009:1190
reference_id RHSA-2009:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1190
10
reference_url https://access.redhat.com/errata/RHSA-2009:1207
reference_id RHSA-2009:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1207
11
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
12
reference_url https://usn.ubuntu.com/810-1/
reference_id USN-810-1
reference_type
scores
url https://usn.ubuntu.com/810-1/
fixed_packages
0
url pkg:deb/debian/nss@3.12.3-1?distro=trixie
purl pkg:deb/debian/nss@3.12.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@3.12.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2009-2408
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uytp-sf6j-xyf6
63
url VCID-uzt2-tufb-rua5
vulnerability_id VCID-uzt2-tufb-rua5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1569.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1569.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1569
reference_id
reference_type
scores
0
value 0.03635
scoring_system epss
scoring_elements 0.8785
published_at 2026-04-21T12:55:00Z
1
value 0.03635
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-01T12:55:00Z
2
value 0.03635
scoring_system epss
scoring_elements 0.87793
published_at 2026-04-02T12:55:00Z
3
value 0.03635
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-04T12:55:00Z
4
value 0.03635
scoring_system epss
scoring_elements 0.87808
published_at 2026-04-07T12:55:00Z
5
value 0.03635
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-08T12:55:00Z
6
value 0.03635
scoring_system epss
scoring_elements 0.87836
published_at 2026-04-09T12:55:00Z
7
value 0.03635
scoring_system epss
scoring_elements 0.87848
published_at 2026-04-11T12:55:00Z
8
value 0.03635
scoring_system epss
scoring_elements 0.87842
published_at 2026-04-12T12:55:00Z
9
value 0.03635
scoring_system epss
scoring_elements 0.8784
published_at 2026-04-13T12:55:00Z
10
value 0.03635
scoring_system epss
scoring_elements 0.87854
published_at 2026-04-16T12:55:00Z
11
value 0.03635
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1569
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569
9
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
10
reference_url https://www.imperialviolet.org/2014/09/26/pkcs1.html
reference_id
reference_type
scores
url https://www.imperialviolet.org/2014/09/26/pkcs1.html
11
reference_url https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
reference_id
reference_type
scores
url https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
12
reference_url http://www.debian.org/security/2015/dsa-3186
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3186
13
reference_url http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
reference_id
reference_type
scores
url http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
16
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
17
reference_url http://www.securitytracker.com/id/1032909
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1032909
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174492
reference_id 1174492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174492
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625
reference_id 773625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1569
reference_id CVE-2014-1569
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1569
28
reference_url https://usn.ubuntu.com/2452-1/
reference_id USN-2452-1
reference_type
scores
url https://usn.ubuntu.com/2452-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.2-1.1?distro=trixie
purl pkg:deb/debian/nss@2:3.17.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1569
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzt2-tufb-rua5
64
url VCID-vjas-pry4-93cz
vulnerability_id VCID-vjas-pry4-93cz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27972
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28029
published_at 2026-04-13T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28036
published_at 2026-04-16T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28019
published_at 2026-04-18T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28102
published_at 2026-04-01T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28174
published_at 2026-04-02T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28218
published_at 2026-04-04T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28079
published_at 2026-04-08T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28122
published_at 2026-04-09T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28129
published_at 2026-04-11T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.28086
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
reference_id 1826231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
reference_id 963152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
9
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
12
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
13
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
14
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
15
reference_url https://usn.ubuntu.com/4417-1/
reference_id USN-4417-1
reference_type
scores
url https://usn.ubuntu.com/4417-1/
16
reference_url https://usn.ubuntu.com/4417-2/
reference_id USN-4417-2
reference_type
scores
url https://usn.ubuntu.com/4417-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.53.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.53.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.53.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2020-12402
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjas-pry4-93cz
65
url VCID-vszp-vyxy-f7g7
vulnerability_id VCID-vszp-vyxy-f7g7
summary Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15332
published_at 2026-04-21T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
reference_id 2442292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
reference_id mfsa2026-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-31/
reference_id mfsa2026-31
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-31/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
reference_id show_bug.cgi?id=2009552
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
41
reference_url https://usn.ubuntu.com/8071-1/
reference_id USN-8071-1
reference_type
scores
url https://usn.ubuntu.com/8071-1/
42
reference_url https://usn.ubuntu.com/8071-2/
reference_id USN-8071-2
reference_type
scores
url https://usn.ubuntu.com/8071-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2026-2781
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vszp-vyxy-f7g7
66
url VCID-vzb9-aeqz-hybr
vulnerability_id VCID-vzb9-aeqz-hybr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74187
published_at 2026-04-21T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-09T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-11T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74155
published_at 2026-04-12T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74149
published_at 2026-04-13T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74186
published_at 2026-04-16T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74195
published_at 2026-04-18T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-01T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-02T12:55:00Z
9
value 0.00806
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-04T12:55:00Z
10
value 0.00806
scoring_system epss
scoring_elements 0.74105
published_at 2026-04-07T12:55:00Z
11
value 0.00806
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
reference_id 1774831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
6
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
7
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
8
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
9
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
10
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
16
reference_url https://access.redhat.com/errata/RHSA-2019:4114
reference_id RHSA-2019:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4114
17
reference_url https://access.redhat.com/errata/RHSA-2019:4152
reference_id RHSA-2019:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4152
18
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
19
reference_url https://access.redhat.com/errata/RHSA-2020:0243
reference_id RHSA-2020:0243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0243
20
reference_url https://access.redhat.com/errata/RHSA-2020:0466
reference_id RHSA-2020:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0466
21
reference_url https://access.redhat.com/errata/RHSA-2020:1267
reference_id RHSA-2020:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1267
22
reference_url https://access.redhat.com/errata/RHSA-2020:1345
reference_id RHSA-2020:1345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1345
23
reference_url https://access.redhat.com/errata/RHSA-2020:1461
reference_id RHSA-2020:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1461
24
reference_url https://usn.ubuntu.com/4203-1/
reference_id USN-4203-1
reference_type
scores
url https://usn.ubuntu.com/4203-1/
25
reference_url https://usn.ubuntu.com/4203-2/
reference_id USN-4203-2
reference_type
scores
url https://usn.ubuntu.com/4203-2/
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.47.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.47.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.47.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-11745
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr
67
url VCID-w5wp-ujx1-vkhp
vulnerability_id VCID-w5wp-ujx1-vkhp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
reference_id
reference_type
scores
0
value 0.01956
scoring_system epss
scoring_elements 0.83519
published_at 2026-04-21T12:55:00Z
1
value 0.01956
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-01T12:55:00Z
2
value 0.01956
scoring_system epss
scoring_elements 0.83517
published_at 2026-04-16T12:55:00Z
3
value 0.01956
scoring_system epss
scoring_elements 0.83518
published_at 2026-04-18T12:55:00Z
4
value 0.01956
scoring_system epss
scoring_elements 0.83429
published_at 2026-04-02T12:55:00Z
5
value 0.01956
scoring_system epss
scoring_elements 0.83443
published_at 2026-04-04T12:55:00Z
6
value 0.01956
scoring_system epss
scoring_elements 0.83442
published_at 2026-04-07T12:55:00Z
7
value 0.01956
scoring_system epss
scoring_elements 0.83467
published_at 2026-04-08T12:55:00Z
8
value 0.01956
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-09T12:55:00Z
9
value 0.01956
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-11T12:55:00Z
10
value 0.01956
scoring_system epss
scoring_elements 0.83485
published_at 2026-04-12T12:55:00Z
11
value 0.01956
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
8
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
9
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
10
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
11
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
12
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
13
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
14
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
15
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
16
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
17
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
18
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
19
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
20
reference_url http://www.securityfocus.com/bid/68816
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68816
21
reference_url http://www.securitytracker.com/id/1030617
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030617
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
reference_id 1116198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
reference_id CVE-2014-1544
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
95
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
96
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
reference_id mfsa2014-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
97
reference_url https://access.redhat.com/errata/RHSA-2014:0915
reference_id RHSA-2014:0915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0915
98
reference_url https://access.redhat.com/errata/RHSA-2014:0916
reference_id RHSA-2014:0916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0916
99
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
100
reference_url https://access.redhat.com/errata/RHSA-2014:1165
reference_id RHSA-2014:1165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1165
101
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
102
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
103
reference_url https://usn.ubuntu.com/2343-1/
reference_id USN-2343-1
reference_type
scores
url https://usn.ubuntu.com/2343-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.16.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.16.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-1544
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5wp-ujx1-vkhp
68
url VCID-w794-gqex-83du
vulnerability_id VCID-w794-gqex-83du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
reference_id
reference_type
scores
0
value 0.00768
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-21T12:55:00Z
1
value 0.00768
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-18T12:55:00Z
2
value 0.00768
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-04T12:55:00Z
3
value 0.00768
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-16T12:55:00Z
4
value 0.00768
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-13T12:55:00Z
5
value 0.00768
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-08T12:55:00Z
6
value 0.00768
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-07T12:55:00Z
7
value 0.00768
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-02T12:55:00Z
8
value 0.00768
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-12T12:55:00Z
9
value 0.00768
scoring_system epss
scoring_elements 0.73517
published_at 2026-04-11T12:55:00Z
10
value 0.00768
scoring_system epss
scoring_elements 0.73493
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
reference_id 2296637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
21
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
22
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
23
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
24
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
25
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
reference_id show_bug.cgi?id=1895032
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
28
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
29
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.101-1?distro=trixie
purl pkg:deb/debian/nss@2:3.101-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.101-1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2024-6602
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du
69
url VCID-wavp-f4kn-j3cm
vulnerability_id VCID-wavp-f4kn-j3cm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48113
published_at 2026-04-21T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.481
published_at 2026-04-12T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48111
published_at 2026-04-13T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-16T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48159
published_at 2026-04-18T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48045
published_at 2026-04-01T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48082
published_at 2026-04-02T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48103
published_at 2026-04-04T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48053
published_at 2026-04-07T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.48106
published_at 2026-04-08T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-09T12:55:00Z
11
value 0.00248
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
reference_id 1730988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
10
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
14
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.45-1?distro=trixie
purl pkg:deb/debian/nss@2:3.45-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.45-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-11727
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wavp-f4kn-j3cm
70
url VCID-wut5-sqr6-mubd
vulnerability_id VCID-wut5-sqr6-mubd
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0591.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0684.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0684.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0685.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0685.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1978.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1978.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1978
reference_id
reference_type
scores
0
value 0.02458
scoring_system epss
scoring_elements 0.85254
published_at 2026-04-18T12:55:00Z
1
value 0.02458
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-01T12:55:00Z
2
value 0.02458
scoring_system epss
scoring_elements 0.85236
published_at 2026-04-12T12:55:00Z
3
value 0.02458
scoring_system epss
scoring_elements 0.85233
published_at 2026-04-13T12:55:00Z
4
value 0.02458
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-21T12:55:00Z
5
value 0.02458
scoring_system epss
scoring_elements 0.85175
published_at 2026-04-02T12:55:00Z
6
value 0.02458
scoring_system epss
scoring_elements 0.85193
published_at 2026-04-04T12:55:00Z
7
value 0.02458
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-07T12:55:00Z
8
value 0.02458
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-08T12:55:00Z
9
value 0.02458
scoring_system epss
scoring_elements 0.85224
published_at 2026-04-09T12:55:00Z
10
value 0.02458
scoring_system epss
scoring_elements 0.85239
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1978
9
reference_url https://bto.bluecoat.com/security-advisory/sa124
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa124
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
16
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-15.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-15.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
21
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
22
reference_url http://www.securityfocus.com/bid/84275
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84275
23
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
24
reference_url http://www.securitytracker.com/id/1035258
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035258
25
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315565
reference_id 1315565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315565
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978
reference_id CVE-2016-1978
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1978
reference_id CVE-2016-1978
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-1978
31
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-15
reference_id mfsa2016-15
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-15
33
reference_url https://access.redhat.com/errata/RHSA-2016:0591
reference_id RHSA-2016:0591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0591
34
reference_url https://access.redhat.com/errata/RHSA-2016:0684
reference_id RHSA-2016:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0684
35
reference_url https://access.redhat.com/errata/RHSA-2016:0685
reference_id RHSA-2016:0685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0685
36
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.21-1?distro=trixie
purl pkg:deb/debian/nss@2:3.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.21-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2016-1978
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wut5-sqr6-mubd
71
url VCID-x1ty-wqph-gkak
vulnerability_id VCID-x1ty-wqph-gkak
summary nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53893
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5391
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53938
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53913
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53965
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53964
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54011
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.53994
published_at 2026-04-12T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.53976
published_at 2026-04-13T12:55:00Z
9
value 0.00308
scoring_system epss
scoring_elements 0.54015
published_at 2026-04-16T12:55:00Z
10
value 0.00308
scoring_system epss
scoring_elements 0.54019
published_at 2026-04-18T12:55:00Z
11
value 0.00308
scoring_system epss
scoring_elements 0.54001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
reference_id 1703979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
6
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
7
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://usn.ubuntu.com/4215-1/
reference_id USN-4215-1
reference_type
scores
url https://usn.ubuntu.com/4215-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.45-1?distro=trixie
purl pkg:deb/debian/nss@2:3.45-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.45-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2019-17007
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ty-wqph-gkak
72
url VCID-xap5-djda-2uem
vulnerability_id VCID-xap5-djda-2uem
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
1
reference_url http://advisories.mageia.org/MGASA-2014-0416.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0416.html
2
reference_url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
3
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
4
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
5
reference_url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
reference_id
reference_type
scores
url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
6
reference_url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
reference_id
reference_type
scores
url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
7
reference_url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
reference_id
reference_type
scores
url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
8
reference_url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
reference_id
reference_type
scores
url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
9
reference_url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
reference_id
reference_type
scores
url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
10
reference_url http://downloads.asterisk.org/pub/security/AST-2014-011.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2014-011.html
11
reference_url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
reference_id
reference_type
scores
url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
12
reference_url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
reference_id
reference_type
scores
url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
13
reference_url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
reference_id
reference_type
scores
url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
14
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
15
reference_url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
16
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
17
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
18
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
19
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
20
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
21
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
26
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
27
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
28
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
29
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
30
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
31
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
32
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
33
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
34
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
35
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
36
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
37
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
38
reference_url http://marc.info/?l=bugtraq&m=141450452204552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450452204552&w=2
39
reference_url http://marc.info/?l=bugtraq&m=141450973807288&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450973807288&w=2
40
reference_url http://marc.info/?l=bugtraq&m=141477196830952&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141477196830952&w=2
41
reference_url http://marc.info/?l=bugtraq&m=141576815022399&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141576815022399&w=2
42
reference_url http://marc.info/?l=bugtraq&m=141577087123040&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577087123040&w=2
43
reference_url http://marc.info/?l=bugtraq&m=141577350823734&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577350823734&w=2
44
reference_url http://marc.info/?l=bugtraq&m=141620103726640&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141620103726640&w=2
45
reference_url http://marc.info/?l=bugtraq&m=141628688425177&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141628688425177&w=2
46
reference_url http://marc.info/?l=bugtraq&m=141694355519663&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141694355519663&w=2
47
reference_url http://marc.info/?l=bugtraq&m=141697638231025&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697638231025&w=2
48
reference_url http://marc.info/?l=bugtraq&m=141697676231104&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697676231104&w=2
49
reference_url http://marc.info/?l=bugtraq&m=141703183219781&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141703183219781&w=2
50
reference_url http://marc.info/?l=bugtraq&m=141715130023061&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141715130023061&w=2
51
reference_url http://marc.info/?l=bugtraq&m=141775427104070&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775427104070&w=2
52
reference_url http://marc.info/?l=bugtraq&m=141813976718456&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141813976718456&w=2
53
reference_url http://marc.info/?l=bugtraq&m=141814011518700&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141814011518700&w=2
54
reference_url http://marc.info/?l=bugtraq&m=141879378918327&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879378918327&w=2
55
reference_url http://marc.info/?l=bugtraq&m=142103967620673&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142103967620673&w=2
56
reference_url http://marc.info/?l=bugtraq&m=142118135300698&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142118135300698&w=2
57
reference_url http://marc.info/?l=bugtraq&m=142296755107581&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142296755107581&w=2
58
reference_url http://marc.info/?l=bugtraq&m=142350196615714&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350196615714&w=2
59
reference_url http://marc.info/?l=bugtraq&m=142350298616097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350298616097&w=2
60
reference_url http://marc.info/?l=bugtraq&m=142350743917559&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350743917559&w=2
61
reference_url http://marc.info/?l=bugtraq&m=142354438527235&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142354438527235&w=2
62
reference_url http://marc.info/?l=bugtraq&m=142357976805598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142357976805598&w=2
63
reference_url http://marc.info/?l=bugtraq&m=142495837901899&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142495837901899&w=2
64
reference_url http://marc.info/?l=bugtraq&m=142496355704097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142496355704097&w=2
65
reference_url http://marc.info/?l=bugtraq&m=142546741516006&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142546741516006&w=2
66
reference_url http://marc.info/?l=bugtraq&m=142607790919348&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142607790919348&w=2
67
reference_url http://marc.info/?l=bugtraq&m=142624590206005&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624590206005&w=2
68
reference_url http://marc.info/?l=bugtraq&m=142624619906067
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067
69
reference_url http://marc.info/?l=bugtraq&m=142624619906067&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067&w=2
70
reference_url http://marc.info/?l=bugtraq&m=142624679706236&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624679706236&w=2
71
reference_url http://marc.info/?l=bugtraq&m=142624719706349&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624719706349&w=2
72
reference_url http://marc.info/?l=bugtraq&m=142660345230545&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142660345230545&w=2
73
reference_url http://marc.info/?l=bugtraq&m=142721830231196&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721830231196&w=2
74
reference_url http://marc.info/?l=bugtraq&m=142721887231400&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721887231400&w=2
75
reference_url http://marc.info/?l=bugtraq&m=142740155824959&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142740155824959&w=2
76
reference_url http://marc.info/?l=bugtraq&m=142791032306609&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142791032306609&w=2
77
reference_url http://marc.info/?l=bugtraq&m=142804214608580&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142804214608580&w=2
78
reference_url http://marc.info/?l=bugtraq&m=142805027510172&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142805027510172&w=2
79
reference_url http://marc.info/?l=bugtraq&m=142962817202793&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142962817202793&w=2
80
reference_url http://marc.info/?l=bugtraq&m=143039249603103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143039249603103&w=2
81
reference_url http://marc.info/?l=bugtraq&m=143101048219218&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143101048219218&w=2
82
reference_url http://marc.info/?l=bugtraq&m=143290371927178&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290371927178&w=2
83
reference_url http://marc.info/?l=bugtraq&m=143290437727362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290437727362&w=2
84
reference_url http://marc.info/?l=bugtraq&m=143290522027658&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290522027658&w=2
85
reference_url http://marc.info/?l=bugtraq&m=143290583027876&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290583027876&w=2
86
reference_url http://marc.info/?l=bugtraq&m=143558137709884&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558137709884&w=2
87
reference_url http://marc.info/?l=bugtraq&m=143558192010071&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558192010071&w=2
88
reference_url http://marc.info/?l=bugtraq&m=143628269912142&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143628269912142&w=2
89
reference_url http://marc.info/?l=bugtraq&m=144101915224472&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144101915224472&w=2
90
reference_url http://marc.info/?l=bugtraq&m=144251162130364&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144251162130364&w=2
91
reference_url http://marc.info/?l=bugtraq&m=144294141001552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144294141001552&w=2
92
reference_url http://marc.info/?l=bugtraq&m=145983526810210&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145983526810210&w=2
93
reference_url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
reference_id
reference_type
scores
url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
94
reference_url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
reference_id
reference_type
scores
url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
95
reference_url http://rhn.redhat.com/errata/RHSA-2014-1652.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1652.html
96
reference_url http://rhn.redhat.com/errata/RHSA-2014-1653.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1653.html
97
reference_url http://rhn.redhat.com/errata/RHSA-2014-1692.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1692.html
98
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
99
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
100
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
101
reference_url http://rhn.redhat.com/errata/RHSA-2014-1881.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1881.html
102
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
103
reference_url http://rhn.redhat.com/errata/RHSA-2014-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1920.html
104
reference_url http://rhn.redhat.com/errata/RHSA-2014-1948.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1948.html
105
reference_url http://rhn.redhat.com/errata/RHSA-2015-0068.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0068.html
106
reference_url http://rhn.redhat.com/errata/RHSA-2015-0079.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0079.html
107
reference_url http://rhn.redhat.com/errata/RHSA-2015-0080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0080.html
108
reference_url http://rhn.redhat.com/errata/RHSA-2015-0085.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0085.html
109
reference_url http://rhn.redhat.com/errata/RHSA-2015-0086.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0086.html
110
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
111
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
112
reference_url http://rhn.redhat.com/errata/RHSA-2015-1545.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1545.html
113
reference_url http://rhn.redhat.com/errata/RHSA-2015-1546.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1546.html
114
reference_url https://access.redhat.com/articles/1232123
reference_id
reference_type
scores
url https://access.redhat.com/articles/1232123
115
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
116
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
reference_id
reference_type
scores
0
value 0.94015
scoring_system epss
scoring_elements 0.99894
published_at 2026-04-02T12:55:00Z
1
value 0.94015
scoring_system epss
scoring_elements 0.99895
published_at 2026-04-11T12:55:00Z
2
value 0.94015
scoring_system epss
scoring_elements 0.99896
published_at 2026-04-13T12:55:00Z
3
value 0.94015
scoring_system epss
scoring_elements 0.99897
published_at 2026-04-18T12:55:00Z
4
value 0.94054
scoring_system epss
scoring_elements 0.99902
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
117
reference_url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
reference_id
reference_type
scores
url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
118
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
119
reference_url https://bto.bluecoat.com/security-advisory/sa83
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa83
120
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
140
reference_url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
reference_id
reference_type
scores
url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
141
reference_url http://secunia.com/advisories/59627
reference_id
reference_type
scores
url http://secunia.com/advisories/59627
142
reference_url http://secunia.com/advisories/60056
reference_id
reference_type
scores
url http://secunia.com/advisories/60056
143
reference_url http://secunia.com/advisories/60206
reference_id
reference_type
scores
url http://secunia.com/advisories/60206
144
reference_url http://secunia.com/advisories/60792
reference_id
reference_type
scores
url http://secunia.com/advisories/60792
145
reference_url http://secunia.com/advisories/60859
reference_id
reference_type
scores
url http://secunia.com/advisories/60859
146
reference_url http://secunia.com/advisories/61019
reference_id
reference_type
scores
url http://secunia.com/advisories/61019
147
reference_url http://secunia.com/advisories/61130
reference_id
reference_type
scores
url http://secunia.com/advisories/61130
148
reference_url http://secunia.com/advisories/61303
reference_id
reference_type
scores
url http://secunia.com/advisories/61303
149
reference_url http://secunia.com/advisories/61316
reference_id
reference_type
scores
url http://secunia.com/advisories/61316
150
reference_url http://secunia.com/advisories/61345
reference_id
reference_type
scores
url http://secunia.com/advisories/61345
151
reference_url http://secunia.com/advisories/61359
reference_id
reference_type
scores
url http://secunia.com/advisories/61359
152
reference_url http://secunia.com/advisories/61782
reference_id
reference_type
scores
url http://secunia.com/advisories/61782
153
reference_url http://secunia.com/advisories/61810
reference_id
reference_type
scores
url http://secunia.com/advisories/61810
154
reference_url http://secunia.com/advisories/61819
reference_id
reference_type
scores
url http://secunia.com/advisories/61819
155
reference_url http://secunia.com/advisories/61825
reference_id
reference_type
scores
url http://secunia.com/advisories/61825
156
reference_url http://secunia.com/advisories/61827
reference_id
reference_type
scores
url http://secunia.com/advisories/61827
157
reference_url http://secunia.com/advisories/61926
reference_id
reference_type
scores
url http://secunia.com/advisories/61926
158
reference_url http://secunia.com/advisories/61995
reference_id
reference_type
scores
url http://secunia.com/advisories/61995
159
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
160
reference_url https://github.com/mpgn/poodle-PoC
reference_id
reference_type
scores
url https://github.com/mpgn/poodle-PoC
161
reference_url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
162
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
163
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
164
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
165
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
166
reference_url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
reference_id
reference_type
scores
url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
167
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
168
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
169
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
170
reference_url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
171
reference_url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
172
reference_url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
173
reference_url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
174
reference_url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
175
reference_url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
176
reference_url https://puppet.com/security/cve/poodle-sslv3-vulnerability
reference_id
reference_type
scores
url https://puppet.com/security/cve/poodle-sslv3-vulnerability
177
reference_url https://security.netapp.com/advisory/ntap-20141015-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20141015-0001/
178
reference_url https://support.apple.com/HT205217
reference_id
reference_type
scores
url https://support.apple.com/HT205217
179
reference_url https://support.apple.com/kb/HT6527
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6527
180
reference_url https://support.apple.com/kb/HT6529
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6529
181
reference_url https://support.apple.com/kb/HT6531
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6531
182
reference_url https://support.apple.com/kb/HT6535
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6535
183
reference_url https://support.apple.com/kb/HT6536
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6536
184
reference_url https://support.apple.com/kb/HT6541
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6541
185
reference_url https://support.apple.com/kb/HT6542
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6542
186
reference_url https://support.citrix.com/article/CTX216642
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX216642
187
reference_url https://support.lenovo.com/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/product_security/poodle
188
reference_url https://support.lenovo.com/us/en/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/us/en/product_security/poodle
189
reference_url https://technet.microsoft.com/library/security/3009008.aspx
reference_id
reference_type
scores
url https://technet.microsoft.com/library/security/3009008.aspx
190
reference_url https://templatelab.com/ssl-poodle/
reference_id
reference_type
scores
url https://templatelab.com/ssl-poodle/
191
reference_url http://support.apple.com/HT204244
reference_id
reference_type
scores
url http://support.apple.com/HT204244
192
reference_url http://support.citrix.com/article/CTX200238
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200238
193
reference_url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
reference_id
reference_type
scores
url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
194
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
195
reference_url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
reference_id
reference_type
scores
url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
196
reference_url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
reference_id
reference_type
scores
url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
197
reference_url https://www.elastic.co/blog/logstash-1-4-3-released
reference_id
reference_type
scores
url https://www.elastic.co/blog/logstash-1-4-3-released
198
reference_url https://www.imperialviolet.org/2014/10/14/poodle.html
reference_id
reference_type
scores
url https://www.imperialviolet.org/2014/10/14/poodle.html
199
reference_url https://www.openssl.org/~bodo/ssl-poodle.pdf
reference_id
reference_type
scores
url https://www.openssl.org/~bodo/ssl-poodle.pdf
200
reference_url https://www.openssl.org/news/secadv_20141015.txt
reference_id
reference_type
scores
url https://www.openssl.org/news/secadv_20141015.txt
201
reference_url https://www.suse.com/support/kb/doc.php?id=7015773
reference_id
reference_type
scores
url https://www.suse.com/support/kb/doc.php?id=7015773
202
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
203
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
204
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
205
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
206
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
207
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
208
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
209
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
210
reference_url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
reference_id
reference_type
scores
url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
211
reference_url http://www.debian.org/security/2014/dsa-3053
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3053
212
reference_url http://www.debian.org/security/2015/dsa-3144
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3144
213
reference_url http://www.debian.org/security/2015/dsa-3147
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3147
214
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3253
215
reference_url http://www.debian.org/security/2016/dsa-3489
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3489
216
reference_url http://www.kb.cert.org/vuls/id/577193
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/577193
217
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
218
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
219
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
220
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
221
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
222
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
223
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
224
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
225
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
226
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
227
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
228
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
229
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
230
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
231
reference_url http://www.securityfocus.com/archive/1/533724/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533724/100/0/threaded
232
reference_url http://www.securityfocus.com/archive/1/533746
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533746
233
reference_url http://www.securityfocus.com/archive/1/533747
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533747
234
reference_url http://www.securityfocus.com/bid/70574
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70574
235
reference_url http://www.securitytracker.com/id/1031029
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031029
236
reference_url http://www.securitytracker.com/id/1031039
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031039
237
reference_url http://www.securitytracker.com/id/1031085
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031085
238
reference_url http://www.securitytracker.com/id/1031086
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031086
239
reference_url http://www.securitytracker.com/id/1031087
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031087
240
reference_url http://www.securitytracker.com/id/1031088
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031088
241
reference_url http://www.securitytracker.com/id/1031089
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031089
242
reference_url http://www.securitytracker.com/id/1031090
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031090
243
reference_url http://www.securitytracker.com/id/1031091
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031091
244
reference_url http://www.securitytracker.com/id/1031092
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031092
245
reference_url http://www.securitytracker.com/id/1031093
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031093
246
reference_url http://www.securitytracker.com/id/1031094
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031094
247
reference_url http://www.securitytracker.com/id/1031095
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031095
248
reference_url http://www.securitytracker.com/id/1031096
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031096
249
reference_url http://www.securitytracker.com/id/1031105
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031105
250
reference_url http://www.securitytracker.com/id/1031106
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031106
251
reference_url http://www.securitytracker.com/id/1031107
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031107
252
reference_url http://www.securitytracker.com/id/1031120
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031120
253
reference_url http://www.securitytracker.com/id/1031123
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031123
254
reference_url http://www.securitytracker.com/id/1031124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031124
255
reference_url http://www.securitytracker.com/id/1031130
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031130
256
reference_url http://www.securitytracker.com/id/1031131
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031131
257
reference_url http://www.securitytracker.com/id/1031132
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031132
258
reference_url http://www.ubuntu.com/usn/USN-2486-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2486-1
259
reference_url http://www.ubuntu.com/usn/USN-2487-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2487-1
260
reference_url http://www.us-cert.gov/ncas/alerts/TA14-290A
reference_id
reference_type
scores
url http://www.us-cert.gov/ncas/alerts/TA14-290A
261
reference_url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
262
reference_url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
reference_id
reference_type
scores
url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
263
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
reference_id 1152789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
264
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
reference_id 765539
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
265
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
reference_id 765702
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
266
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
reference_id 768164
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
267
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
reference_id 769904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
268
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
reference_id 771359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
299
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
300
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
301
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
302
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
303
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
304
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
305
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
306
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
307
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
308
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
309
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
310
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
311
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
312
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
313
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
314
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
315
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
316
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
317
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
318
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
319
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
320
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
321
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
322
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
323
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
324
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
325
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
326
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
327
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
328
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
329
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
330
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
331
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
332
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
333
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
334
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
335
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
336
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
337
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
338
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
339
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
340
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
341
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
342
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
343
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
344
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
345
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
346
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
347
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
348
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
349
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
350
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
351
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
352
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
353
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
354
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
355
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
356
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
357
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
358
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
359
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
360
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
361
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
362
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
363
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
364
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
365
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
366
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
367
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
368
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
369
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
370
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
371
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
372
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
373
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
374
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
375
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
376
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
377
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
378
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
379
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
380
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
381
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
382
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
383
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
384
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
385
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
386
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
387
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
388
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
389
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
390
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
391
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
392
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
393
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
394
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
395
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
396
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
397
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
398
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
399
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
400
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
401
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
402
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
403
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
404
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
405
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
406
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
407
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
408
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
409
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
410
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
411
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
412
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
413
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
414
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
415
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
416
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
reference_id CVE-2014-3566
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
417
reference_url https://security.gentoo.org/glsa/201411-10
reference_id GLSA-201411-10
reference_type
scores
url https://security.gentoo.org/glsa/201411-10
418
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
419
reference_url https://security.gentoo.org/glsa/201606-11
reference_id GLSA-201606-11
reference_type
scores
url https://security.gentoo.org/glsa/201606-11
420
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
421
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
422
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
423
reference_url https://access.redhat.com/errata/RHSA-2014:1881
reference_id RHSA-2014:1881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1881
424
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
425
reference_url https://access.redhat.com/errata/RHSA-2014:1920
reference_id RHSA-2014:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1920
426
reference_url https://access.redhat.com/errata/RHSA-2015:0010
reference_id RHSA-2015:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0010
427
reference_url https://access.redhat.com/errata/RHSA-2015:0011
reference_id RHSA-2015:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0011
428
reference_url https://access.redhat.com/errata/RHSA-2015:0012
reference_id RHSA-2015:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0012
429
reference_url https://access.redhat.com/errata/RHSA-2015:0067
reference_id RHSA-2015:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0067
430
reference_url https://access.redhat.com/errata/RHSA-2015:0068
reference_id RHSA-2015:0068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0068
431
reference_url https://access.redhat.com/errata/RHSA-2015:0069
reference_id RHSA-2015:0069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0069
432
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
433
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
434
reference_url https://access.redhat.com/errata/RHSA-2015:0085
reference_id RHSA-2015:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0085
435
reference_url https://access.redhat.com/errata/RHSA-2015:0086
reference_id RHSA-2015:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0086
436
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
437
reference_url https://access.redhat.com/errata/RHSA-2015:1545
reference_id RHSA-2015:1545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1545
438
reference_url https://access.redhat.com/errata/RHSA-2015:1546
reference_id RHSA-2015:1546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1546
439
reference_url https://usn.ubuntu.com/2486-1/
reference_id USN-2486-1
reference_type
scores
url https://usn.ubuntu.com/2486-1/
440
reference_url https://usn.ubuntu.com/2487-1/
reference_id USN-2487-1
reference_type
scores
url https://usn.ubuntu.com/2487-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.17.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2014-3566
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xap5-djda-2uem
73
url VCID-y43f-tmvr-hqas
vulnerability_id VCID-y43f-tmvr-hqas
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32403
published_at 2026-04-21T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32433
published_at 2026-04-18T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32455
published_at 2026-04-16T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32546
published_at 2026-04-02T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32419
published_at 2026-04-13T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32446
published_at 2026-04-12T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32485
published_at 2026-04-11T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-09T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32454
published_at 2026-04-08T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32582
published_at 2026-04-04T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32406
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
reference_id 2039572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
reference_id show_bug.cgi?id=1735028
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
35
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
36
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
37
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
38
reference_url https://usn.ubuntu.com/5506-1/
reference_id USN-5506-1
reference_type
scores
url https://usn.ubuntu.com/5506-1/
39
reference_url https://usn.ubuntu.com/5872-1/
reference_id USN-5872-1
reference_type
scores
url https://usn.ubuntu.com/5872-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.73-1?distro=trixie
purl pkg:deb/debian/nss@2:3.73-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.73-1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
6
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2022-22747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y43f-tmvr-hqas
74
url VCID-yazh-n5vb-pkf1
vulnerability_id VCID-yazh-n5vb-pkf1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1135.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1135.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1144.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1144.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0791.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0791.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0791
reference_id
reference_type
scores
0
value 0.02065
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-21T12:55:00Z
1
value 0.02065
scoring_system epss
scoring_elements 0.83859
published_at 2026-04-01T12:55:00Z
2
value 0.02065
scoring_system epss
scoring_elements 0.83927
published_at 2026-04-13T12:55:00Z
3
value 0.02065
scoring_system epss
scoring_elements 0.83952
published_at 2026-04-18T12:55:00Z
4
value 0.02065
scoring_system epss
scoring_elements 0.83873
published_at 2026-04-02T12:55:00Z
5
value 0.02065
scoring_system epss
scoring_elements 0.83889
published_at 2026-04-04T12:55:00Z
6
value 0.02065
scoring_system epss
scoring_elements 0.8389
published_at 2026-04-07T12:55:00Z
7
value 0.02065
scoring_system epss
scoring_elements 0.83914
published_at 2026-04-08T12:55:00Z
8
value 0.02065
scoring_system epss
scoring_elements 0.8392
published_at 2026-04-09T12:55:00Z
9
value 0.02065
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-11T12:55:00Z
10
value 0.02065
scoring_system epss
scoring_elements 0.83931
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0791
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=629816
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=629816
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150
11
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-40.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-40.html
12
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
13
reference_url http://www.securityfocus.com/bid/58826
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58826
14
reference_url http://www.ubuntu.com/usn/USN-1791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1791-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=946947
reference_id 946947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=946947
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
reference_id CVE-2013-0791
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0791
reference_id CVE-2013-0791
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0791
36
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-40
reference_id mfsa2013-40
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-40
38
reference_url https://access.redhat.com/errata/RHSA-2013:1135
reference_id RHSA-2013:1135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1135
39
reference_url https://access.redhat.com/errata/RHSA-2013:1144
reference_id RHSA-2013:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1144
40
reference_url https://access.redhat.com/errata/RHSA-2013:1181
reference_id RHSA-2013:1181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1181
41
reference_url https://usn.ubuntu.com/1786-1/
reference_id USN-1786-1
reference_type
scores
url https://usn.ubuntu.com/1786-1/
42
reference_url https://usn.ubuntu.com/1791-1/
reference_id USN-1791-1
reference_type
scores
url https://usn.ubuntu.com/1791-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-0791
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yazh-n5vb-pkf1
75
url VCID-ykkw-a6a1-43fe
vulnerability_id VCID-ykkw-a6a1-43fe
summary nss: Cache side-channel variant of the Bleichenbacher attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
reference_id
reference_type
scores
0
value 0.14501
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-01T12:55:00Z
1
value 0.14501
scoring_system epss
scoring_elements 0.9442
published_at 2026-04-02T12:55:00Z
2
value 0.14501
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-04T12:55:00Z
3
value 0.14501
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-07T12:55:00Z
4
value 0.14501
scoring_system epss
scoring_elements 0.94442
published_at 2026-04-08T12:55:00Z
5
value 0.14501
scoring_system epss
scoring_elements 0.94446
published_at 2026-04-09T12:55:00Z
6
value 0.14501
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-11T12:55:00Z
7
value 0.14501
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-13T12:55:00Z
8
value 0.14501
scoring_system epss
scoring_elements 0.94465
published_at 2026-04-16T12:55:00Z
9
value 0.14501
scoring_system epss
scoring_elements 0.94469
published_at 2026-04-18T12:55:00Z
10
value 0.14501
scoring_system epss
scoring_elements 0.94473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
reference_id 1657913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
5
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
6
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
7
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.41-1?distro=trixie
purl pkg:deb/debian/nss@2:3.41-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.41-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2018-12404
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ykkw-a6a1-43fe
76
url VCID-z26z-btvf-x7eq
vulnerability_id VCID-z26z-btvf-x7eq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
reference_id
reference_type
scores
0
value 0.11044
scoring_system epss
scoring_elements 0.9347
published_at 2026-04-21T12:55:00Z
1
value 0.11044
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-01T12:55:00Z
2
value 0.11044
scoring_system epss
scoring_elements 0.9344
published_at 2026-04-13T12:55:00Z
3
value 0.11044
scoring_system epss
scoring_elements 0.93459
published_at 2026-04-16T12:55:00Z
4
value 0.11044
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-18T12:55:00Z
5
value 0.11044
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-02T12:55:00Z
6
value 0.11044
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-07T12:55:00Z
7
value 0.11044
scoring_system epss
scoring_elements 0.93429
published_at 2026-04-08T12:55:00Z
8
value 0.11044
scoring_system epss
scoring_elements 0.93433
published_at 2026-04-09T12:55:00Z
9
value 0.11044
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-11T12:55:00Z
10
value 0.11044
scoring_system epss
scoring_elements 0.93439
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
reference_id 1269351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
reference_id CVE-2015-7182
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
73
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
74
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
75
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
76
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
77
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
78
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
79
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
80
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
81
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.20.1-1?distro=trixie
purl pkg:deb/debian/nss@2:3.20.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.20.1-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2015-7182
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z26z-btvf-x7eq
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie