Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/125896?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/125896?format=api", "purl": "pkg:rpm/redhat/thunderbird@10.0.6-1?arch=el6_3", "type": "rpm", "namespace": "redhat", "name": "thunderbird", "version": "10.0.6-1", "qualifiers": { "arch": "el6_3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55392?format=api", "vulnerability_id": "VCID-5ck6-ca4e-yqdc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.8745", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87424", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.8742", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87444", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1967" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840259", "reference_id": "840259", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840259" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967", "reference_id": "CVE-2012-1967", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-56", "reference_id": "mfsa2012-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1967" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ck6-ca4e-yqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55270?format=api", "vulnerability_id": "VCID-63n5-1xtt-9fgb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1951", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87448", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87441", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1951" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205", "reference_id": "840205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951", "reference_id": "CVE-2012-1951", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44", "reference_id": "mfsa2012-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1951" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63n5-1xtt-9fgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55320?format=api", "vulnerability_id": "VCID-7a5f-gu1y-ckhk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.7617", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.7608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76119", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76138", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76121", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76161", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1959" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840212", "reference_id": "840212", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959", "reference_id": "CVE-2012-1959", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-49", "reference_id": "mfsa2012-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-49" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1959" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7a5f-gu1y-ckhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55361?format=api", "vulnerability_id": "VCID-8q4m-rkhj-5fhj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1964", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75756", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75627", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7575", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1964" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840222", "reference_id": "840222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964", "reference_id": "CVE-2012-1964", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-54", "reference_id": "mfsa2012-54", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1964" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8q4m-rkhj-5fhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55287?format=api", "vulnerability_id": "VCID-96cx-jg1g-vkdd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1954.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1954.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1954", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89737", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89669", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89716", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89715", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89725", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.8972", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05001", "scoring_system": "epss", "scoring_elements": "0.89735", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1954" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205", "reference_id": "840205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954", "reference_id": "CVE-2012-1954", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44", "reference_id": "mfsa2012-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1954" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96cx-jg1g-vkdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55308?format=api", "vulnerability_id": "VCID-9qc6-vb2t-zuh8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1957", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.7704", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76989", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.77004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.77006", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76999", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1957" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840208", "reference_id": "840208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957", "reference_id": "CVE-2012-1957", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-47", "reference_id": "mfsa2012-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1957" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9qc6-vb2t-zuh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55278?format=api", "vulnerability_id": "VCID-aasu-5m32-m7a8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1953.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1953.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1953", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80618", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80509", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.8055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80589", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01416", "scoring_system": "epss", "scoring_elements": "0.80615", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205", "reference_id": "840205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953", "reference_id": "CVE-2012-1953", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44", "reference_id": "mfsa2012-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1953" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aasu-5m32-m7a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55316?format=api", "vulnerability_id": "VCID-bnfy-q3yv-k7h1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1958", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88269", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88203", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.8824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88233", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88247", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88264", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1958" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840211", "reference_id": "840211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958", "reference_id": "CVE-2012-1958", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-48", "reference_id": "mfsa2012-48", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-48" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1958" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnfy-q3yv-k7h1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55251?format=api", "vulnerability_id": "VCID-ggpm-kmqe-uya3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1948.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1948.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1948", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86846", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86754", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86773", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86771", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86799", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86809", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.8682", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.8684", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1948" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840201", "reference_id": "840201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948", "reference_id": "CVE-2012-1948", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-42", "reference_id": "mfsa2012-42", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-42" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1948" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ggpm-kmqe-uya3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55330?format=api", "vulnerability_id": "VCID-n252-jv5g-77ab", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78741", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78651", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78709", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78733", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1961" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840214", "reference_id": "840214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961", "reference_id": "CVE-2012-1961", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-51", "reference_id": "mfsa2012-51", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1961" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n252-jv5g-77ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55345?format=api", "vulnerability_id": "VCID-tw4j-8pph-yqdn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1963", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81102", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80974", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80983", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.8104", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81075", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81094", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1963" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840220", "reference_id": "840220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963", "reference_id": "CVE-2012-1963", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-53", "reference_id": "mfsa2012-53", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-53" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1963" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tw4j-8pph-yqdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55294?format=api", "vulnerability_id": "VCID-u7w3-5raz-uyhf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85627", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85533", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85599", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85616", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1955" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840206", "reference_id": "840206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955", "reference_id": "CVE-2012-1955", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-45", "reference_id": "mfsa2012-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-45" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1955" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u7w3-5raz-uyhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55271?format=api", "vulnerability_id": "VCID-vv7j-bmke-nqhb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1952.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1952.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.7965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79531", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79559", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79547", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79604", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79588", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.7958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79643", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1952" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205", "reference_id": "840205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952", "reference_id": "CVE-2012-1952", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44", "reference_id": "mfsa2012-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1952" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vv7j-bmke-nqhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55336?format=api", "vulnerability_id": "VCID-vvwx-y7rj-73h7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1962", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87448", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87441", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1962" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840215", "reference_id": "840215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962", "reference_id": "CVE-2012-1962", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-52", "reference_id": "mfsa2012-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1962" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvwx-y7rj-73h7" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.6-1%3Farch=el6_3" }