Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@10.0.5-2?arch=el6_2
Typerpm
Namespaceredhat
Namethunderbird
Version10.0.5-2
Qualifiers
arch el6_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1g36-3t6y-6ueh
vulnerability_id VCID-1g36-3t6y-6ueh
summary
Mozilla developers identified and fixed several memory safety bugs
in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption
under certain circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary code.In general these flaws cannot be exploited through email in the Thunderbird
and SeaMonkey products because scripting is disabled, but are potentially a risk
in browser or browser-like contexts in those products.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3105.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3105
reference_id
reference_type
scores
0
value 0.03223
scoring_system epss
scoring_elements 0.87072
published_at 2026-04-16T12:55:00Z
1
value 0.03223
scoring_system epss
scoring_elements 0.87003
published_at 2026-04-01T12:55:00Z
2
value 0.03223
scoring_system epss
scoring_elements 0.87014
published_at 2026-04-02T12:55:00Z
3
value 0.03223
scoring_system epss
scoring_elements 0.87032
published_at 2026-04-04T12:55:00Z
4
value 0.03223
scoring_system epss
scoring_elements 0.87025
published_at 2026-04-07T12:55:00Z
5
value 0.03223
scoring_system epss
scoring_elements 0.87046
published_at 2026-04-08T12:55:00Z
6
value 0.03223
scoring_system epss
scoring_elements 0.87053
published_at 2026-04-09T12:55:00Z
7
value 0.03223
scoring_system epss
scoring_elements 0.87066
published_at 2026-04-11T12:55:00Z
8
value 0.03223
scoring_system epss
scoring_elements 0.87061
published_at 2026-04-12T12:55:00Z
9
value 0.03223
scoring_system epss
scoring_elements 0.87055
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3105
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3105
reference_id CVE-2012-3105
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3105
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
reference_id mfsa2012-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
5
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
6
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
fixed_packages
aliases CVE-2012-3105
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1g36-3t6y-6ueh
1
url VCID-1szy-64t4-2bab
vulnerability_id VCID-1szy-64t4-2bab
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1938
reference_id
reference_type
scores
0
value 0.01248
scoring_system epss
scoring_elements 0.79338
published_at 2026-04-16T12:55:00Z
1
value 0.01248
scoring_system epss
scoring_elements 0.79263
published_at 2026-04-01T12:55:00Z
2
value 0.01248
scoring_system epss
scoring_elements 0.7927
published_at 2026-04-02T12:55:00Z
3
value 0.01248
scoring_system epss
scoring_elements 0.79294
published_at 2026-04-04T12:55:00Z
4
value 0.01248
scoring_system epss
scoring_elements 0.7928
published_at 2026-04-07T12:55:00Z
5
value 0.01248
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-08T12:55:00Z
6
value 0.01248
scoring_system epss
scoring_elements 0.79315
published_at 2026-04-09T12:55:00Z
7
value 0.01248
scoring_system epss
scoring_elements 0.79339
published_at 2026-04-11T12:55:00Z
8
value 0.01248
scoring_system epss
scoring_elements 0.79322
published_at 2026-04-12T12:55:00Z
9
value 0.01248
scoring_system epss
scoring_elements 0.79311
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1938
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
reference_id CVE-2012-1938
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
reference_id mfsa2012-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1938
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1szy-64t4-2bab
2
url VCID-5y7y-3fnf-cueh
vulnerability_id VCID-5y7y-3fnf-cueh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1945.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1945
reference_id
reference_type
scores
0
value 0.00192
scoring_system epss
scoring_elements 0.41173
published_at 2026-04-13T12:55:00Z
1
value 0.00192
scoring_system epss
scoring_elements 0.41093
published_at 2026-04-01T12:55:00Z
2
value 0.00192
scoring_system epss
scoring_elements 0.41185
published_at 2026-04-02T12:55:00Z
3
value 0.00192
scoring_system epss
scoring_elements 0.41216
published_at 2026-04-16T12:55:00Z
4
value 0.00192
scoring_system epss
scoring_elements 0.41142
published_at 2026-04-07T12:55:00Z
5
value 0.00192
scoring_system epss
scoring_elements 0.41191
published_at 2026-04-08T12:55:00Z
6
value 0.00192
scoring_system epss
scoring_elements 0.41199
published_at 2026-04-09T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.4122
published_at 2026-04-11T12:55:00Z
8
value 0.00192
scoring_system epss
scoring_elements 0.41187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1945
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827831
reference_id 827831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827831
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
reference_id CVE-2012-1945
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-37
reference_id mfsa2012-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-37
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-3fnf-cueh
3
url VCID-cq4q-mh6g-aub7
vulnerability_id VCID-cq4q-mh6g-aub7
summary
Security researcher Adam Barth found that inline event handlers, such as onclick, were no longer blocked by Content Security
Policy's (CSP) inline-script blocking feature. Web applications relying on this feature of CSP to protect against cross-site scripting (XSS) were not fully protected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1944.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1944.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1944
reference_id
reference_type
scores
0
value 0.00696
scoring_system epss
scoring_elements 0.71952
published_at 2026-04-16T12:55:00Z
1
value 0.00696
scoring_system epss
scoring_elements 0.71873
published_at 2026-04-01T12:55:00Z
2
value 0.00696
scoring_system epss
scoring_elements 0.7188
published_at 2026-04-02T12:55:00Z
3
value 0.00696
scoring_system epss
scoring_elements 0.71899
published_at 2026-04-04T12:55:00Z
4
value 0.00696
scoring_system epss
scoring_elements 0.71871
published_at 2026-04-07T12:55:00Z
5
value 0.00696
scoring_system epss
scoring_elements 0.7191
published_at 2026-04-13T12:55:00Z
6
value 0.00696
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-09T12:55:00Z
7
value 0.00696
scoring_system epss
scoring_elements 0.71945
published_at 2026-04-11T12:55:00Z
8
value 0.00696
scoring_system epss
scoring_elements 0.71927
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1944
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827830
reference_id 827830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827830
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
reference_id CVE-2012-1944
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-36
reference_id mfsa2012-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-36
5
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
6
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
7
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
8
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
9
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1944
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cq4q-mh6g-aub7
4
url VCID-debh-4s35-j3hs
vulnerability_id VCID-debh-4s35-j3hs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1937.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1937.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1937
reference_id
reference_type
scores
0
value 0.01723
scoring_system epss
scoring_elements 0.82443
published_at 2026-04-16T12:55:00Z
1
value 0.01723
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-01T12:55:00Z
2
value 0.01723
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-02T12:55:00Z
3
value 0.01723
scoring_system epss
scoring_elements 0.82367
published_at 2026-04-04T12:55:00Z
4
value 0.01723
scoring_system epss
scoring_elements 0.82363
published_at 2026-04-07T12:55:00Z
5
value 0.01723
scoring_system epss
scoring_elements 0.82391
published_at 2026-04-08T12:55:00Z
6
value 0.01723
scoring_system epss
scoring_elements 0.82398
published_at 2026-04-09T12:55:00Z
7
value 0.01723
scoring_system epss
scoring_elements 0.82417
published_at 2026-04-11T12:55:00Z
8
value 0.01723
scoring_system epss
scoring_elements 0.82413
published_at 2026-04-12T12:55:00Z
9
value 0.01723
scoring_system epss
scoring_elements 0.82408
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1937
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937
reference_id CVE-2012-1937
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
reference_id mfsa2012-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1937
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-debh-4s35-j3hs
5
url VCID-jcm4-ykz6-a7ej
vulnerability_id VCID-jcm4-ykz6-a7ej
summary
Multiple vulnerabilities have been reported in Chromium and V8,
    some of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3101.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3101.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3101
reference_id
reference_type
scores
0
value 0.0174
scoring_system epss
scoring_elements 0.82436
published_at 2026-04-01T12:55:00Z
1
value 0.0174
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-02T12:55:00Z
2
value 0.0174
scoring_system epss
scoring_elements 0.82468
published_at 2026-04-04T12:55:00Z
3
value 0.0174
scoring_system epss
scoring_elements 0.82465
published_at 2026-04-07T12:55:00Z
4
value 0.0174
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-08T12:55:00Z
5
value 0.0174
scoring_system epss
scoring_elements 0.82498
published_at 2026-04-09T12:55:00Z
6
value 0.0174
scoring_system epss
scoring_elements 0.82517
published_at 2026-04-11T12:55:00Z
7
value 0.0174
scoring_system epss
scoring_elements 0.82513
published_at 2026-04-12T12:55:00Z
8
value 0.0174
scoring_system epss
scoring_elements 0.82508
published_at 2026-04-13T12:55:00Z
9
value 0.0174
scoring_system epss
scoring_elements 0.82545
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3101
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://security.gentoo.org/glsa/201205-03
reference_id GLSA-201205-03
reference_type
scores
url https://security.gentoo.org/glsa/201205-03
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
6
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
7
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
8
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
9
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2011-3101
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jcm4-ykz6-a7ej
6
url VCID-p2gf-sccx-5qb8
vulnerability_id VCID-p2gf-sccx-5qb8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1941.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1941
reference_id
reference_type
scores
0
value 0.06289
scoring_system epss
scoring_elements 0.9097
published_at 2026-04-16T12:55:00Z
1
value 0.06289
scoring_system epss
scoring_elements 0.90895
published_at 2026-04-01T12:55:00Z
2
value 0.06289
scoring_system epss
scoring_elements 0.909
published_at 2026-04-02T12:55:00Z
3
value 0.06289
scoring_system epss
scoring_elements 0.9091
published_at 2026-04-04T12:55:00Z
4
value 0.06289
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-07T12:55:00Z
5
value 0.06289
scoring_system epss
scoring_elements 0.90931
published_at 2026-04-08T12:55:00Z
6
value 0.06289
scoring_system epss
scoring_elements 0.90937
published_at 2026-04-09T12:55:00Z
7
value 0.06289
scoring_system epss
scoring_elements 0.90946
published_at 2026-04-11T12:55:00Z
8
value 0.06289
scoring_system epss
scoring_elements 0.90947
published_at 2026-04-12T12:55:00Z
9
value 0.06289
scoring_system epss
scoring_elements 0.90945
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1941
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827843
reference_id 827843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941
reference_id CVE-2012-1941
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
reference_id mfsa2012-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1941
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2gf-sccx-5qb8
7
url VCID-s3m1-pnhd-n3ex
vulnerability_id VCID-s3m1-pnhd-n3ex
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1947
reference_id
reference_type
scores
0
value 0.06784
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-16T12:55:00Z
1
value 0.06784
scoring_system epss
scoring_elements 0.91265
published_at 2026-04-01T12:55:00Z
2
value 0.06784
scoring_system epss
scoring_elements 0.91269
published_at 2026-04-02T12:55:00Z
3
value 0.06784
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-04T12:55:00Z
4
value 0.06784
scoring_system epss
scoring_elements 0.91286
published_at 2026-04-07T12:55:00Z
5
value 0.06784
scoring_system epss
scoring_elements 0.91298
published_at 2026-04-08T12:55:00Z
6
value 0.06784
scoring_system epss
scoring_elements 0.91304
published_at 2026-04-09T12:55:00Z
7
value 0.06784
scoring_system epss
scoring_elements 0.91311
published_at 2026-04-11T12:55:00Z
8
value 0.06784
scoring_system epss
scoring_elements 0.91314
published_at 2026-04-12T12:55:00Z
9
value 0.06784
scoring_system epss
scoring_elements 0.91313
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1947
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827843
reference_id 827843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
reference_id CVE-2012-1947
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
reference_id mfsa2012-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1947
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3m1-pnhd-n3ex
8
url VCID-v5y5-u355-mbdd
vulnerability_id VCID-v5y5-u355-mbdd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1946
reference_id
reference_type
scores
0
value 0.01451
scoring_system epss
scoring_elements 0.8082
published_at 2026-04-16T12:55:00Z
1
value 0.01451
scoring_system epss
scoring_elements 0.80727
published_at 2026-04-01T12:55:00Z
2
value 0.01451
scoring_system epss
scoring_elements 0.80736
published_at 2026-04-02T12:55:00Z
3
value 0.01451
scoring_system epss
scoring_elements 0.80757
published_at 2026-04-04T12:55:00Z
4
value 0.01451
scoring_system epss
scoring_elements 0.80754
published_at 2026-04-07T12:55:00Z
5
value 0.01451
scoring_system epss
scoring_elements 0.80782
published_at 2026-04-08T12:55:00Z
6
value 0.01451
scoring_system epss
scoring_elements 0.80791
published_at 2026-04-09T12:55:00Z
7
value 0.01451
scoring_system epss
scoring_elements 0.80807
published_at 2026-04-11T12:55:00Z
8
value 0.01451
scoring_system epss
scoring_elements 0.80792
published_at 2026-04-12T12:55:00Z
9
value 0.01451
scoring_system epss
scoring_elements 0.80784
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1946
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827832
reference_id 827832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827832
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
reference_id CVE-2012-1946
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-38
reference_id mfsa2012-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-38
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1946
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5y5-u355-mbdd
9
url VCID-vfbw-j8m3-bbdm
vulnerability_id VCID-vfbw-j8m3-bbdm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1940.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1940
reference_id
reference_type
scores
0
value 0.03035
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-16T12:55:00Z
1
value 0.03035
scoring_system epss
scoring_elements 0.86601
published_at 2026-04-01T12:55:00Z
2
value 0.03035
scoring_system epss
scoring_elements 0.86612
published_at 2026-04-02T12:55:00Z
3
value 0.03035
scoring_system epss
scoring_elements 0.86631
published_at 2026-04-07T12:55:00Z
4
value 0.03035
scoring_system epss
scoring_elements 0.8665
published_at 2026-04-08T12:55:00Z
5
value 0.03035
scoring_system epss
scoring_elements 0.8666
published_at 2026-04-09T12:55:00Z
6
value 0.03035
scoring_system epss
scoring_elements 0.86673
published_at 2026-04-11T12:55:00Z
7
value 0.03035
scoring_system epss
scoring_elements 0.86671
published_at 2026-04-12T12:55:00Z
8
value 0.03035
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1940
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827843
reference_id 827843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940
reference_id CVE-2012-1940
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
reference_id mfsa2012-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
aliases CVE-2012-1940
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfbw-j8m3-bbdm
10
url VCID-x41h-sx4r-3bc8
vulnerability_id VCID-x41h-sx4r-3bc8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1939.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1939
reference_id
reference_type
scores
0
value 0.03612
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-16T12:55:00Z
1
value 0.03612
scoring_system epss
scoring_elements 0.87731
published_at 2026-04-01T12:55:00Z
2
value 0.03612
scoring_system epss
scoring_elements 0.87742
published_at 2026-04-02T12:55:00Z
3
value 0.03612
scoring_system epss
scoring_elements 0.87755
published_at 2026-04-04T12:55:00Z
4
value 0.03612
scoring_system epss
scoring_elements 0.87758
published_at 2026-04-07T12:55:00Z
5
value 0.03612
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-08T12:55:00Z
6
value 0.03612
scoring_system epss
scoring_elements 0.87785
published_at 2026-04-09T12:55:00Z
7
value 0.03612
scoring_system epss
scoring_elements 0.87796
published_at 2026-04-11T12:55:00Z
8
value 0.03612
scoring_system epss
scoring_elements 0.87791
published_at 2026-04-12T12:55:00Z
9
value 0.03612
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1939
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939
reference_id CVE-2012-1939
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
reference_id mfsa2012-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
fixed_packages
aliases CVE-2012-1939
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x41h-sx4r-3bc8
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.5-2%3Farch=el6_2