Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@38.6.0-1?arch=el7_2
Typerpm
Namespaceredhat
Namefirefox
Version38.6.0-1
Qualifiers
arch el7_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-k4qs-aaqm-eucb
vulnerability_id VCID-k4qs-aaqm-eucb
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0071.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0071.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0258.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0258.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1935.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1935.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1935
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.64048
published_at 2026-04-18T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63919
published_at 2026-04-01T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.64044
published_at 2026-04-11T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-12T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.64001
published_at 2026-04-13T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.64036
published_at 2026-04-16T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.63977
published_at 2026-04-02T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64005
published_at 2026-04-04T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.63965
published_at 2026-04-07T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64015
published_at 2026-04-08T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64032
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1935
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
18
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
19
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
21
reference_url http://www.securityfocus.com/bid/81952
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81952
22
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
23
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
24
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
25
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301821
reference_id 1301821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301821
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1935
reference_id CVE-2016-1935
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1935
41
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-03
reference_id mfsa2016-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-03
43
reference_url https://access.redhat.com/errata/RHSA-2016:0071
reference_id RHSA-2016:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0071
44
reference_url https://access.redhat.com/errata/RHSA-2016:0258
reference_id RHSA-2016:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0258
45
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
46
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
aliases CVE-2016-1935
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4qs-aaqm-eucb
1
url VCID-my4s-k6en-qkc2
vulnerability_id VCID-my4s-k6en-qkc2
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0071.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0071.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0258.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0258.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1930.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1930.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1930
reference_id
reference_type
scores
0
value 0.0186
scoring_system epss
scoring_elements 0.83083
published_at 2026-04-18T12:55:00Z
1
value 0.0186
scoring_system epss
scoring_elements 0.8298
published_at 2026-04-01T12:55:00Z
2
value 0.0186
scoring_system epss
scoring_elements 0.83055
published_at 2026-04-11T12:55:00Z
3
value 0.0186
scoring_system epss
scoring_elements 0.83049
published_at 2026-04-12T12:55:00Z
4
value 0.0186
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-13T12:55:00Z
5
value 0.0186
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-02T12:55:00Z
6
value 0.0186
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-04T12:55:00Z
7
value 0.0186
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-07T12:55:00Z
8
value 0.0186
scoring_system epss
scoring_elements 0.83032
published_at 2026-04-08T12:55:00Z
9
value 0.0186
scoring_system epss
scoring_elements 0.83039
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1930
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
27
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
28
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
29
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
30
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
31
reference_url http://www.securityfocus.com/bid/81953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81953
32
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
33
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
34
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
35
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301818
reference_id 1301818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301818
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1930
reference_id CVE-2016-1930
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1930
51
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-01
reference_id mfsa2016-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-01
53
reference_url https://access.redhat.com/errata/RHSA-2016:0071
reference_id RHSA-2016:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0071
54
reference_url https://access.redhat.com/errata/RHSA-2016:0258
reference_id RHSA-2016:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0258
55
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
56
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
aliases CVE-2016-1930
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my4s-k6en-qkc2
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@38.6.0-1%3Farch=el7_2