Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@24.2.0-1?arch=el6_5
Typerpm
Namespaceredhat
Namefirefox
Version24.2.0-1
Qualifiers
arch el6_5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-62px-695g-57bk
vulnerability_id VCID-62px-695g-57bk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
reference_id
reference_type
scores
0
value 0.11056
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-16T12:55:00Z
1
value 0.11056
scoring_system epss
scoring_elements 0.93411
published_at 2026-04-01T12:55:00Z
2
value 0.11056
scoring_system epss
scoring_elements 0.93418
published_at 2026-04-02T12:55:00Z
3
value 0.11056
scoring_system epss
scoring_elements 0.93426
published_at 2026-04-04T12:55:00Z
4
value 0.11056
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-07T12:55:00Z
5
value 0.11056
scoring_system epss
scoring_elements 0.93435
published_at 2026-04-08T12:55:00Z
6
value 0.11056
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-09T12:55:00Z
7
value 0.11056
scoring_system epss
scoring_elements 0.93444
published_at 2026-04-12T12:55:00Z
8
value 0.11056
scoring_system epss
scoring_elements 0.93445
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
reference_id 1039429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
reference_id CVE-2013-5613
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
reference_id mfsa2013-114
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5613
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk
1
url VCID-69g6-8d1a-kubz
vulnerability_id VCID-69g6-8d1a-kubz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
reference_id
reference_type
scores
0
value 0.10399
scoring_system epss
scoring_elements 0.9323
published_at 2026-04-16T12:55:00Z
1
value 0.10399
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-01T12:55:00Z
2
value 0.10399
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-02T12:55:00Z
3
value 0.10399
scoring_system epss
scoring_elements 0.932
published_at 2026-04-04T12:55:00Z
4
value 0.10399
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-07T12:55:00Z
5
value 0.10399
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-08T12:55:00Z
6
value 0.10399
scoring_system epss
scoring_elements 0.9321
published_at 2026-04-09T12:55:00Z
7
value 0.10399
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-11T12:55:00Z
8
value 0.10399
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-12T12:55:00Z
9
value 0.10399
scoring_system epss
scoring_elements 0.93214
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
reference_id 1039426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
reference_id CVE-2013-6671
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
reference_id mfsa2013-111
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-6671
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz
2
url VCID-b2k8-kjmq-1kh4
vulnerability_id VCID-b2k8-kjmq-1kh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
reference_id
reference_type
scores
0
value 0.10378
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-16T12:55:00Z
1
value 0.10378
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-01T12:55:00Z
2
value 0.10378
scoring_system epss
scoring_elements 0.93189
published_at 2026-04-02T12:55:00Z
3
value 0.10378
scoring_system epss
scoring_elements 0.93193
published_at 2026-04-04T12:55:00Z
4
value 0.10378
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-07T12:55:00Z
5
value 0.10378
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-08T12:55:00Z
6
value 0.10378
scoring_system epss
scoring_elements 0.93204
published_at 2026-04-09T12:55:00Z
7
value 0.10378
scoring_system epss
scoring_elements 0.93208
published_at 2026-04-11T12:55:00Z
8
value 0.10378
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-12T12:55:00Z
9
value 0.10378
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
reference_id 1039423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
reference_id CVE-2013-5618
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
reference_id mfsa2013-109
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5618
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4
3
url VCID-db94-kcvc-zybp
vulnerability_id VCID-db94-kcvc-zybp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
reference_id
reference_type
scores
0
value 0.02874
scoring_system epss
scoring_elements 0.86294
published_at 2026-04-16T12:55:00Z
1
value 0.02874
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-01T12:55:00Z
2
value 0.02874
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-02T12:55:00Z
3
value 0.02874
scoring_system epss
scoring_elements 0.86239
published_at 2026-04-04T12:55:00Z
4
value 0.02874
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-07T12:55:00Z
5
value 0.02874
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-08T12:55:00Z
6
value 0.02874
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-09T12:55:00Z
7
value 0.02874
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-11T12:55:00Z
8
value 0.02874
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-12T12:55:00Z
9
value 0.02874
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
reference_id 1039422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
reference_id CVE-2013-5616
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
reference_id mfsa2013-108
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp
4
url VCID-gsx1-3jjx-nqan
vulnerability_id VCID-gsx1-3jjx-nqan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72937
published_at 2026-04-16T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.72842
published_at 2026-04-01T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-02T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72869
published_at 2026-04-04T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72844
published_at 2026-04-07T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72882
published_at 2026-04-08T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72896
published_at 2026-04-13T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72921
published_at 2026-04-11T12:55:00Z
8
value 0.00739
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
reference_id 1039420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
reference_id CVE-2013-5612
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
reference_id mfsa2013-106
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
aliases CVE-2013-5612
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan
5
url VCID-t5xp-1qqf-cfht
vulnerability_id VCID-t5xp-1qqf-cfht
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1812.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1812.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-16T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79587
published_at 2026-04-01T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79645
published_at 2026-04-12T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-13T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79594
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79617
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.7964
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
7
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
8
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
9
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911840
reference_id 911840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911840
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
31
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
reference_id mfsa2013-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
33
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
34
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
35
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
fixed_packages
aliases CVE-2013-0772
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5xp-1qqf-cfht
6
url VCID-vg9h-jcc1-9qeg
vulnerability_id VCID-vg9h-jcc1-9qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
reference_id
reference_type
scores
0
value 0.02752
scoring_system epss
scoring_elements 0.86022
published_at 2026-04-16T12:55:00Z
1
value 0.02752
scoring_system epss
scoring_elements 0.85941
published_at 2026-04-01T12:55:00Z
2
value 0.02752
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-02T12:55:00Z
3
value 0.02752
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-04T12:55:00Z
4
value 0.02752
scoring_system epss
scoring_elements 0.85967
published_at 2026-04-07T12:55:00Z
5
value 0.02752
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-08T12:55:00Z
6
value 0.02752
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-09T12:55:00Z
7
value 0.02752
scoring_system epss
scoring_elements 0.8601
published_at 2026-04-11T12:55:00Z
8
value 0.02752
scoring_system epss
scoring_elements 0.86008
published_at 2026-04-12T12:55:00Z
9
value 0.02752
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
reference_id 1039417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
reference_id CVE-2013-5609
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
reference_id mfsa2013-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
aliases CVE-2013-5609
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg
7
url VCID-vhq8-wmxx-wqgt
vulnerability_id VCID-vhq8-wmxx-wqgt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-16T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51227
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51278
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51303
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51263
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51318
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51315
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51358
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51337
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
reference_id 1039421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
reference_id CVE-2013-5614
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
reference_id mfsa2013-107
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
aliases CVE-2013-5614
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@24.2.0-1%3Farch=el6_5