Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@24.2.0-1?arch=el6_5
Typerpm
Namespaceredhat
Namethunderbird
Version24.2.0-1
Qualifiers
arch el6_5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-62px-695g-57bk
vulnerability_id VCID-62px-695g-57bk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
reference_id
reference_type
scores
0
value 0.11056
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-16T12:55:00Z
1
value 0.11056
scoring_system epss
scoring_elements 0.93411
published_at 2026-04-01T12:55:00Z
2
value 0.11056
scoring_system epss
scoring_elements 0.93418
published_at 2026-04-02T12:55:00Z
3
value 0.11056
scoring_system epss
scoring_elements 0.93426
published_at 2026-04-04T12:55:00Z
4
value 0.11056
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-07T12:55:00Z
5
value 0.11056
scoring_system epss
scoring_elements 0.93435
published_at 2026-04-08T12:55:00Z
6
value 0.11056
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-09T12:55:00Z
7
value 0.11056
scoring_system epss
scoring_elements 0.93444
published_at 2026-04-12T12:55:00Z
8
value 0.11056
scoring_system epss
scoring_elements 0.93445
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
reference_id 1039429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
reference_id CVE-2013-5613
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
reference_id mfsa2013-114
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5613
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk
1
url VCID-69g6-8d1a-kubz
vulnerability_id VCID-69g6-8d1a-kubz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
reference_id
reference_type
scores
0
value 0.10399
scoring_system epss
scoring_elements 0.9323
published_at 2026-04-16T12:55:00Z
1
value 0.10399
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-01T12:55:00Z
2
value 0.10399
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-02T12:55:00Z
3
value 0.10399
scoring_system epss
scoring_elements 0.932
published_at 2026-04-04T12:55:00Z
4
value 0.10399
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-07T12:55:00Z
5
value 0.10399
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-08T12:55:00Z
6
value 0.10399
scoring_system epss
scoring_elements 0.9321
published_at 2026-04-09T12:55:00Z
7
value 0.10399
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-11T12:55:00Z
8
value 0.10399
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-12T12:55:00Z
9
value 0.10399
scoring_system epss
scoring_elements 0.93214
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
reference_id 1039426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
reference_id CVE-2013-6671
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
reference_id mfsa2013-111
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-6671
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz
2
url VCID-b2k8-kjmq-1kh4
vulnerability_id VCID-b2k8-kjmq-1kh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
reference_id
reference_type
scores
0
value 0.10378
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-16T12:55:00Z
1
value 0.10378
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-01T12:55:00Z
2
value 0.10378
scoring_system epss
scoring_elements 0.93189
published_at 2026-04-02T12:55:00Z
3
value 0.10378
scoring_system epss
scoring_elements 0.93193
published_at 2026-04-04T12:55:00Z
4
value 0.10378
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-07T12:55:00Z
5
value 0.10378
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-08T12:55:00Z
6
value 0.10378
scoring_system epss
scoring_elements 0.93204
published_at 2026-04-09T12:55:00Z
7
value 0.10378
scoring_system epss
scoring_elements 0.93208
published_at 2026-04-11T12:55:00Z
8
value 0.10378
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-12T12:55:00Z
9
value 0.10378
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
reference_id 1039423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
reference_id CVE-2013-5618
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
reference_id mfsa2013-109
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5618
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4
3
url VCID-db94-kcvc-zybp
vulnerability_id VCID-db94-kcvc-zybp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
reference_id
reference_type
scores
0
value 0.02874
scoring_system epss
scoring_elements 0.86294
published_at 2026-04-16T12:55:00Z
1
value 0.02874
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-01T12:55:00Z
2
value 0.02874
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-02T12:55:00Z
3
value 0.02874
scoring_system epss
scoring_elements 0.86239
published_at 2026-04-04T12:55:00Z
4
value 0.02874
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-07T12:55:00Z
5
value 0.02874
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-08T12:55:00Z
6
value 0.02874
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-09T12:55:00Z
7
value 0.02874
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-11T12:55:00Z
8
value 0.02874
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-12T12:55:00Z
9
value 0.02874
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
reference_id 1039422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
reference_id CVE-2013-5616
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
reference_id mfsa2013-108
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp
4
url VCID-dbre-65bp-xbf1
vulnerability_id VCID-dbre-65bp-xbf1
summary
Security researcher Fabián Cuchietti discovered that
it was possible to bypass the restriction on JavaScript execution in mail by
embedding an <iframe> with a data: URL within a message. If the victim
replied or forwarded the mail after receiving it, quoting it "in-line"
using Thunderbird's HTML mail editor, it would run the attached script. The
running script would be restricted to the mail composition window where it could
observe and potentially modify the content of the mail before it was sent.
Scripts were not executed if the recipient merely viewed the mail, only if it
was edited as HTML. Turning off HTML composition prevented the vulnerability and
forwarding the mail "as attachment" prevented the forwarding
variant.Ateeq ur Rehman Khan of Vulnerability Labs reported
additional variants of this attack involving the use of the <object> tag
and which could be used to attach object data types such as images, audio, or
video.This affected the Thunderbird 17 branch. It was fixed in all
versions based on Gecko 23 or later. Thunderbird 24 and later are not affected
by this vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6674
reference_id
reference_type
scores
0
value 0.47529
scoring_system epss
scoring_elements 0.97708
published_at 2026-04-16T12:55:00Z
1
value 0.47529
scoring_system epss
scoring_elements 0.9768
published_at 2026-04-01T12:55:00Z
2
value 0.47529
scoring_system epss
scoring_elements 0.97687
published_at 2026-04-02T12:55:00Z
3
value 0.47529
scoring_system epss
scoring_elements 0.97688
published_at 2026-04-07T12:55:00Z
4
value 0.47529
scoring_system epss
scoring_elements 0.97693
published_at 2026-04-08T12:55:00Z
5
value 0.47529
scoring_system epss
scoring_elements 0.97696
published_at 2026-04-09T12:55:00Z
6
value 0.47529
scoring_system epss
scoring_elements 0.97698
published_at 2026-04-11T12:55:00Z
7
value 0.47529
scoring_system epss
scoring_elements 0.97701
published_at 2026-04-12T12:55:00Z
8
value 0.47529
scoring_system epss
scoring_elements 0.97702
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6674
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1063120
reference_id 1063120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1063120
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6674
reference_id CVE-2013-6674
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6674
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/31223.txt
reference_id CVE-2013-6674;OSVDB-102566
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/31223.txt
5
reference_url https://www.vulnerability-lab.com/get_content.php?id=953
reference_id CVE-2013-6674;OSVDB-102566
reference_type exploit
scores
url https://www.vulnerability-lab.com/get_content.php?id=953
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-14
reference_id mfsa2014-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-14
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
aliases CVE-2013-6674
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dbre-65bp-xbf1
5
url VCID-gsx1-3jjx-nqan
vulnerability_id VCID-gsx1-3jjx-nqan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72937
published_at 2026-04-16T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.72842
published_at 2026-04-01T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-02T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72869
published_at 2026-04-04T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72844
published_at 2026-04-07T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72882
published_at 2026-04-08T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72896
published_at 2026-04-13T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72921
published_at 2026-04-11T12:55:00Z
8
value 0.00739
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
reference_id 1039420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
reference_id CVE-2013-5612
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
reference_id mfsa2013-106
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
aliases CVE-2013-5612
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan
6
url VCID-t5xp-1qqf-cfht
vulnerability_id VCID-t5xp-1qqf-cfht
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1812.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1812.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-16T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79587
published_at 2026-04-01T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79645
published_at 2026-04-12T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-13T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79594
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79617
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.7964
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
7
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
8
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
9
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911840
reference_id 911840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911840
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
31
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
reference_id mfsa2013-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
33
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
34
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
35
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
fixed_packages
aliases CVE-2013-0772
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5xp-1qqf-cfht
7
url VCID-vg9h-jcc1-9qeg
vulnerability_id VCID-vg9h-jcc1-9qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
reference_id
reference_type
scores
0
value 0.02752
scoring_system epss
scoring_elements 0.86022
published_at 2026-04-16T12:55:00Z
1
value 0.02752
scoring_system epss
scoring_elements 0.85941
published_at 2026-04-01T12:55:00Z
2
value 0.02752
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-02T12:55:00Z
3
value 0.02752
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-04T12:55:00Z
4
value 0.02752
scoring_system epss
scoring_elements 0.85967
published_at 2026-04-07T12:55:00Z
5
value 0.02752
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-08T12:55:00Z
6
value 0.02752
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-09T12:55:00Z
7
value 0.02752
scoring_system epss
scoring_elements 0.8601
published_at 2026-04-11T12:55:00Z
8
value 0.02752
scoring_system epss
scoring_elements 0.86008
published_at 2026-04-12T12:55:00Z
9
value 0.02752
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
reference_id 1039417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
reference_id CVE-2013-5609
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
reference_id mfsa2013-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5609
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg
8
url VCID-vhq8-wmxx-wqgt
vulnerability_id VCID-vhq8-wmxx-wqgt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-16T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51227
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51278
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51303
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51263
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51318
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51315
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51358
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51337
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
reference_id 1039421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
reference_id CVE-2013-5614
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
reference_id mfsa2013-107
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
aliases CVE-2013-5614
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@24.2.0-1%3Farch=el6_5