Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/123849?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/123849?format=api", "purl": "pkg:rpm/redhat/thunderbird@17.0.9-1?arch=el5_9", "type": "rpm", "namespace": "redhat", "name": "thunderbird", "version": "17.0.9-1", "qualifiers": { "arch": "el5_9" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46467?format=api", "vulnerability_id": "VCID-2stf-rr9y-d3d1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81382", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81449", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009031", "reference_id": "1009031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009031" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-76", "reference_id": "mfsa2013-76", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-76" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1718" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2stf-rr9y-d3d1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46484?format=api", "vulnerability_id": "VCID-9c5k-2ftn-gqbg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96871", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96897", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.969", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.33161", "scoring_system": "epss", "scoring_elements": "0.96902", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009037", "reference_id": "1009037", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009037" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-89", "reference_id": "mfsa2013-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-89" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1732" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c5k-2ftn-gqbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46488?format=api", "vulnerability_id": "VCID-abm8-zes1-f7gm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1736.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.88015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87944", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87972", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87992", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.87999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.88009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.88002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03732", "scoring_system": "epss", "scoring_elements": "0.88001", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039", "reference_id": "1009039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90", "reference_id": "mfsa2013-90", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1736" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-abm8-zes1-f7gm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46481?format=api", "vulnerability_id": "VCID-b5rm-htak-byga", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72661", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72644", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72634", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009036", "reference_id": "1009036", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009036" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-88", "reference_id": "mfsa2013-88", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-88" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1730" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5rm-htak-byga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46487?format=api", "vulnerability_id": "VCID-h2ba-gpbd-fqfd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89144", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89085", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.8912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89136", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04502", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039", "reference_id": "1009039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90", "reference_id": "mfsa2013-90", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1735" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ba-gpbd-fqfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46476?format=api", "vulnerability_id": "VCID-nfqd-hm51-mbbd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86257", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86178", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86221", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86246", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.86244", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02856", "scoring_system": "epss", "scoring_elements": "0.8624", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009033", "reference_id": "1009033", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009033" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-82", "reference_id": "mfsa2013-82", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-82" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1725" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfqd-hm51-mbbd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46472?format=api", "vulnerability_id": "VCID-nn8u-pnsy-3ff4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88193", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88218", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03865", "scoring_system": "epss", "scoring_elements": "0.88222", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009032", "reference_id": "1009032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009032" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-79", "reference_id": "mfsa2013-79", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-79" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1722" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn8u-pnsy-3ff4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46489?format=api", "vulnerability_id": "VCID-v49v-hsce-audp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, some of which may allow a remote user to\n execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61834", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61823", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61791", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009041", "reference_id": "1009041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009041" }, { "reference_url": "https://security.gentoo.org/glsa/201309-23", "reference_id": "GLSA-201309-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201309-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-91", "reference_id": "mfsa2013-91", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-91" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268", "reference_id": "RHSA-2013:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269", "reference_id": "RHSA-2013:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1269" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1737" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v49v-hsce-audp" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@17.0.9-1%3Farch=el5_9" }