Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@10.0.4-1?arch=el5_8
Typerpm
Namespaceredhat
Namethunderbird
Version10.0.4-1
Qualifiers
arch el5_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1zkd-zp3h-eyfn
vulnerability_id VCID-1zkd-zp3h-eyfn
summary
Multiple vulnerabilities have been reported in Chromium and V8,
    some of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3062
reference_id
reference_type
scores
0
value 0.02392
scoring_system epss
scoring_elements 0.85054
published_at 2026-04-18T12:55:00Z
1
value 0.02392
scoring_system epss
scoring_elements 0.84954
published_at 2026-04-01T12:55:00Z
2
value 0.02392
scoring_system epss
scoring_elements 0.84968
published_at 2026-04-02T12:55:00Z
3
value 0.02392
scoring_system epss
scoring_elements 0.84985
published_at 2026-04-04T12:55:00Z
4
value 0.02392
scoring_system epss
scoring_elements 0.8499
published_at 2026-04-07T12:55:00Z
5
value 0.02392
scoring_system epss
scoring_elements 0.85012
published_at 2026-04-08T12:55:00Z
6
value 0.02392
scoring_system epss
scoring_elements 0.85019
published_at 2026-04-09T12:55:00Z
7
value 0.02392
scoring_system epss
scoring_elements 0.85035
published_at 2026-04-11T12:55:00Z
8
value 0.02392
scoring_system epss
scoring_elements 0.85034
published_at 2026-04-12T12:55:00Z
9
value 0.02392
scoring_system epss
scoring_elements 0.8503
published_at 2026-04-13T12:55:00Z
10
value 0.02392
scoring_system epss
scoring_elements 0.85051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3062
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815042
reference_id 815042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
reference_id CVE-2011-3062
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
4
reference_url https://security.gentoo.org/glsa/201203-24
reference_id GLSA-201203-24
reference_type
scores
url https://security.gentoo.org/glsa/201203-24
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-31
reference_id mfsa2012-31
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-31
7
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
8
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
9
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
10
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2011-3062
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1zkd-zp3h-eyfn
1
url VCID-7zwg-29p1-17ds
vulnerability_id VCID-7zwg-29p1-17ds
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0477
reference_id
reference_type
scores
0
value 0.00722
scoring_system epss
scoring_elements 0.72545
published_at 2026-04-21T12:55:00Z
1
value 0.00722
scoring_system epss
scoring_elements 0.72457
published_at 2026-04-07T12:55:00Z
2
value 0.00722
scoring_system epss
scoring_elements 0.72463
published_at 2026-04-02T12:55:00Z
3
value 0.00722
scoring_system epss
scoring_elements 0.72481
published_at 2026-04-04T12:55:00Z
4
value 0.00722
scoring_system epss
scoring_elements 0.72495
published_at 2026-04-08T12:55:00Z
5
value 0.00722
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-09T12:55:00Z
6
value 0.00722
scoring_system epss
scoring_elements 0.72531
published_at 2026-04-11T12:55:00Z
7
value 0.00722
scoring_system epss
scoring_elements 0.72513
published_at 2026-04-12T12:55:00Z
8
value 0.00722
scoring_system epss
scoring_elements 0.72504
published_at 2026-04-13T12:55:00Z
9
value 0.00722
scoring_system epss
scoring_elements 0.72546
published_at 2026-04-16T12:55:00Z
10
value 0.00722
scoring_system epss
scoring_elements 0.72556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0477
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815026
reference_id 815026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
reference_id CVE-2012-0477
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-29
reference_id mfsa2012-29
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-29
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0477
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zwg-29p1-17ds
2
url VCID-8sq7-89sv-ykad
vulnerability_id VCID-8sq7-89sv-ykad
summary
Security research firm iDefense reported that researcher
wushi of team509 discovered a memory corruption on Windows
Vista and Windows 7 systems with hardware acceleration disabled or using
incompatible video drivers. This is created by using cairo-dwrite to attempt to
render fonts on an unsupported code path. This corruption causes a potentially
exploitable crash on affected systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0472
reference_id
reference_type
scores
0
value 0.01525
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-21T12:55:00Z
1
value 0.01525
scoring_system epss
scoring_elements 0.81218
published_at 2026-04-01T12:55:00Z
2
value 0.01525
scoring_system epss
scoring_elements 0.81227
published_at 2026-04-02T12:55:00Z
3
value 0.01525
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-04T12:55:00Z
4
value 0.01525
scoring_system epss
scoring_elements 0.81249
published_at 2026-04-07T12:55:00Z
5
value 0.01525
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-08T12:55:00Z
6
value 0.01525
scoring_system epss
scoring_elements 0.81282
published_at 2026-04-09T12:55:00Z
7
value 0.01525
scoring_system epss
scoring_elements 0.81303
published_at 2026-04-11T12:55:00Z
8
value 0.01525
scoring_system epss
scoring_elements 0.81289
published_at 2026-04-12T12:55:00Z
9
value 0.01525
scoring_system epss
scoring_elements 0.81281
published_at 2026-04-13T12:55:00Z
10
value 0.01525
scoring_system epss
scoring_elements 0.81318
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0472
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815022
reference_id 815022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
reference_id CVE-2012-0472
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-25
reference_id mfsa2012-25
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-25
5
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
6
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
fixed_packages
aliases CVE-2012-0472
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sq7-89sv-ykad
3
url VCID-9rkg-yu78-aybg
vulnerability_id VCID-9rkg-yu78-aybg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0468
reference_id
reference_type
scores
0
value 0.02458
scoring_system epss
scoring_elements 0.85258
published_at 2026-04-18T12:55:00Z
1
value 0.02458
scoring_system epss
scoring_elements 0.85167
published_at 2026-04-01T12:55:00Z
2
value 0.02458
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-02T12:55:00Z
3
value 0.02458
scoring_system epss
scoring_elements 0.85196
published_at 2026-04-04T12:55:00Z
4
value 0.02458
scoring_system epss
scoring_elements 0.85198
published_at 2026-04-07T12:55:00Z
5
value 0.02458
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-08T12:55:00Z
6
value 0.02458
scoring_system epss
scoring_elements 0.85228
published_at 2026-04-09T12:55:00Z
7
value 0.02458
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-11T12:55:00Z
8
value 0.02458
scoring_system epss
scoring_elements 0.8524
published_at 2026-04-12T12:55:00Z
9
value 0.02458
scoring_system epss
scoring_elements 0.85236
published_at 2026-04-13T12:55:00Z
10
value 0.02458
scoring_system epss
scoring_elements 0.85257
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0468
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815000
reference_id 815000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815000
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
reference_id CVE-2012-0468
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-20
reference_id mfsa2012-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-20
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0468
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rkg-yu78-aybg
4
url VCID-9ynp-8r9e-v3hm
vulnerability_id VCID-9ynp-8r9e-v3hm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0467.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0467
reference_id
reference_type
scores
0
value 0.02405
scoring_system epss
scoring_elements 0.851
published_at 2026-04-18T12:55:00Z
1
value 0.02405
scoring_system epss
scoring_elements 0.85002
published_at 2026-04-01T12:55:00Z
2
value 0.02405
scoring_system epss
scoring_elements 0.85014
published_at 2026-04-02T12:55:00Z
3
value 0.02405
scoring_system epss
scoring_elements 0.85032
published_at 2026-04-04T12:55:00Z
4
value 0.02405
scoring_system epss
scoring_elements 0.85036
published_at 2026-04-07T12:55:00Z
5
value 0.02405
scoring_system epss
scoring_elements 0.85059
published_at 2026-04-08T12:55:00Z
6
value 0.02405
scoring_system epss
scoring_elements 0.85066
published_at 2026-04-09T12:55:00Z
7
value 0.02405
scoring_system epss
scoring_elements 0.85082
published_at 2026-04-11T12:55:00Z
8
value 0.02405
scoring_system epss
scoring_elements 0.8508
published_at 2026-04-12T12:55:00Z
9
value 0.02405
scoring_system epss
scoring_elements 0.85076
published_at 2026-04-13T12:55:00Z
10
value 0.02405
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0467
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815000
reference_id 815000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815000
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
reference_id CVE-2012-0467
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-20
reference_id mfsa2012-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-20
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0467
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ynp-8r9e-v3hm
5
url VCID-c3tr-d7n7-zyhd
vulnerability_id VCID-c3tr-d7n7-zyhd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0469
reference_id
reference_type
scores
0
value 0.11376
scoring_system epss
scoring_elements 0.93535
published_at 2026-04-04T12:55:00Z
1
value 0.11376
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-01T12:55:00Z
2
value 0.11376
scoring_system epss
scoring_elements 0.93528
published_at 2026-04-02T12:55:00Z
3
value 0.17081
scoring_system epss
scoring_elements 0.94988
published_at 2026-04-09T12:55:00Z
4
value 0.17081
scoring_system epss
scoring_elements 0.94992
published_at 2026-04-11T12:55:00Z
5
value 0.17081
scoring_system epss
scoring_elements 0.94994
published_at 2026-04-12T12:55:00Z
6
value 0.17081
scoring_system epss
scoring_elements 0.94996
published_at 2026-04-13T12:55:00Z
7
value 0.17081
scoring_system epss
scoring_elements 0.95005
published_at 2026-04-16T12:55:00Z
8
value 0.17081
scoring_system epss
scoring_elements 0.95009
published_at 2026-04-18T12:55:00Z
9
value 0.17081
scoring_system epss
scoring_elements 0.95012
published_at 2026-04-21T12:55:00Z
10
value 0.17081
scoring_system epss
scoring_elements 0.94975
published_at 2026-04-07T12:55:00Z
11
value 0.17081
scoring_system epss
scoring_elements 0.94984
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0469
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815019
reference_id 815019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815019
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
reference_id CVE-2012-0469
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-22
reference_id mfsa2012-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-22
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0469
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3tr-d7n7-zyhd
6
url VCID-gfdq-tc9r-cqhg
vulnerability_id VCID-gfdq-tc9r-cqhg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0474
reference_id
reference_type
scores
0
value 0.00685
scoring_system epss
scoring_elements 0.71692
published_at 2026-04-21T12:55:00Z
1
value 0.00685
scoring_system epss
scoring_elements 0.71624
published_at 2026-04-01T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71631
published_at 2026-04-02T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71649
published_at 2026-04-04T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-07T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71661
published_at 2026-04-08T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71672
published_at 2026-04-09T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71696
published_at 2026-04-11T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71679
published_at 2026-04-12T12:55:00Z
9
value 0.00685
scoring_system epss
scoring_elements 0.7166
published_at 2026-04-13T12:55:00Z
10
value 0.00685
scoring_system epss
scoring_elements 0.71704
published_at 2026-04-16T12:55:00Z
11
value 0.00685
scoring_system epss
scoring_elements 0.71711
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0474
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815024
reference_id 815024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815024
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
reference_id CVE-2012-0474
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-27
reference_id mfsa2012-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-27
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0474
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfdq-tc9r-cqhg
7
url VCID-gw7m-z4bd-xkd3
vulnerability_id VCID-gw7m-z4bd-xkd3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0473
reference_id
reference_type
scores
0
value 0.00712
scoring_system epss
scoring_elements 0.7231
published_at 2026-04-21T12:55:00Z
1
value 0.00712
scoring_system epss
scoring_elements 0.72227
published_at 2026-04-01T12:55:00Z
2
value 0.00712
scoring_system epss
scoring_elements 0.72233
published_at 2026-04-02T12:55:00Z
3
value 0.00712
scoring_system epss
scoring_elements 0.72253
published_at 2026-04-04T12:55:00Z
4
value 0.00712
scoring_system epss
scoring_elements 0.72229
published_at 2026-04-07T12:55:00Z
5
value 0.00712
scoring_system epss
scoring_elements 0.72266
published_at 2026-04-08T12:55:00Z
6
value 0.00712
scoring_system epss
scoring_elements 0.72278
published_at 2026-04-09T12:55:00Z
7
value 0.00712
scoring_system epss
scoring_elements 0.723
published_at 2026-04-11T12:55:00Z
8
value 0.00712
scoring_system epss
scoring_elements 0.72284
published_at 2026-04-12T12:55:00Z
9
value 0.00712
scoring_system epss
scoring_elements 0.72271
published_at 2026-04-13T12:55:00Z
10
value 0.00712
scoring_system epss
scoring_elements 0.72313
published_at 2026-04-16T12:55:00Z
11
value 0.00712
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0473
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815023
reference_id 815023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815023
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
reference_id CVE-2012-0473
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-26
reference_id mfsa2012-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-26
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0473
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gw7m-z4bd-xkd3
8
url VCID-k66t-arjf-duhj
vulnerability_id VCID-k66t-arjf-duhj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0478
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73247
published_at 2026-04-21T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73148
published_at 2026-04-01T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73158
published_at 2026-04-02T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73179
published_at 2026-04-04T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73153
published_at 2026-04-07T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73189
published_at 2026-04-08T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73202
published_at 2026-04-13T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73227
published_at 2026-04-11T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73209
published_at 2026-04-12T12:55:00Z
9
value 0.00753
scoring_system epss
scoring_elements 0.73245
published_at 2026-04-16T12:55:00Z
10
value 0.00753
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815037
reference_id 815037
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
reference_id CVE-2012-0478
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-30
reference_id mfsa2012-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-30
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0478
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k66t-arjf-duhj
9
url VCID-susy-jnsq-fqht
vulnerability_id VCID-susy-jnsq-fqht
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0470
reference_id
reference_type
scores
0
value 0.05707
scoring_system epss
scoring_elements 0.90433
published_at 2026-04-21T12:55:00Z
1
value 0.05707
scoring_system epss
scoring_elements 0.90381
published_at 2026-04-01T12:55:00Z
2
value 0.05707
scoring_system epss
scoring_elements 0.90383
published_at 2026-04-02T12:55:00Z
3
value 0.05707
scoring_system epss
scoring_elements 0.90396
published_at 2026-04-04T12:55:00Z
4
value 0.05707
scoring_system epss
scoring_elements 0.904
published_at 2026-04-07T12:55:00Z
5
value 0.05707
scoring_system epss
scoring_elements 0.90414
published_at 2026-04-08T12:55:00Z
6
value 0.05707
scoring_system epss
scoring_elements 0.90421
published_at 2026-04-09T12:55:00Z
7
value 0.05707
scoring_system epss
scoring_elements 0.90428
published_at 2026-04-12T12:55:00Z
8
value 0.05707
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-13T12:55:00Z
9
value 0.05707
scoring_system epss
scoring_elements 0.90435
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0470
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815020
reference_id 815020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815020
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
reference_id CVE-2012-0470
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-23
reference_id mfsa2012-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-23
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0470
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-susy-jnsq-fqht
10
url VCID-tg3e-uvm1-cbfu
vulnerability_id VCID-tg3e-uvm1-cbfu
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0479
reference_id
reference_type
scores
0
value 0.00775
scoring_system epss
scoring_elements 0.73644
published_at 2026-04-21T12:55:00Z
1
value 0.00775
scoring_system epss
scoring_elements 0.7355
published_at 2026-04-01T12:55:00Z
2
value 0.00775
scoring_system epss
scoring_elements 0.73559
published_at 2026-04-02T12:55:00Z
3
value 0.00775
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-04T12:55:00Z
4
value 0.00775
scoring_system epss
scoring_elements 0.73555
published_at 2026-04-07T12:55:00Z
5
value 0.00775
scoring_system epss
scoring_elements 0.73591
published_at 2026-04-08T12:55:00Z
6
value 0.00775
scoring_system epss
scoring_elements 0.73604
published_at 2026-04-09T12:55:00Z
7
value 0.00775
scoring_system epss
scoring_elements 0.73626
published_at 2026-04-11T12:55:00Z
8
value 0.00775
scoring_system epss
scoring_elements 0.73608
published_at 2026-04-12T12:55:00Z
9
value 0.00775
scoring_system epss
scoring_elements 0.73599
published_at 2026-04-13T12:55:00Z
10
value 0.00775
scoring_system epss
scoring_elements 0.73643
published_at 2026-04-16T12:55:00Z
11
value 0.00775
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0479
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815044
reference_id 815044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815044
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479
reference_id CVE-2012-0479
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-33
reference_id mfsa2012-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-33
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0479
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tg3e-uvm1-cbfu
11
url VCID-wdt4-m7fr-q3hm
vulnerability_id VCID-wdt4-m7fr-q3hm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0471
reference_id
reference_type
scores
0
value 0.00722
scoring_system epss
scoring_elements 0.72545
published_at 2026-04-21T12:55:00Z
1
value 0.00722
scoring_system epss
scoring_elements 0.72457
published_at 2026-04-07T12:55:00Z
2
value 0.00722
scoring_system epss
scoring_elements 0.72463
published_at 2026-04-02T12:55:00Z
3
value 0.00722
scoring_system epss
scoring_elements 0.72481
published_at 2026-04-04T12:55:00Z
4
value 0.00722
scoring_system epss
scoring_elements 0.72495
published_at 2026-04-08T12:55:00Z
5
value 0.00722
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-09T12:55:00Z
6
value 0.00722
scoring_system epss
scoring_elements 0.72531
published_at 2026-04-11T12:55:00Z
7
value 0.00722
scoring_system epss
scoring_elements 0.72513
published_at 2026-04-12T12:55:00Z
8
value 0.00722
scoring_system epss
scoring_elements 0.72504
published_at 2026-04-13T12:55:00Z
9
value 0.00722
scoring_system epss
scoring_elements 0.72546
published_at 2026-04-16T12:55:00Z
10
value 0.00722
scoring_system epss
scoring_elements 0.72556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0471
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=815021
reference_id 815021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=815021
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
reference_id CVE-2012-0471
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-24
reference_id mfsa2012-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-24
6
reference_url https://access.redhat.com/errata/RHSA-2012:0515
reference_id RHSA-2012:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0515
7
reference_url https://access.redhat.com/errata/RHSA-2012:0516
reference_id RHSA-2012:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0516
8
reference_url https://usn.ubuntu.com/1430-1/
reference_id USN-1430-1
reference_type
scores
url https://usn.ubuntu.com/1430-1/
9
reference_url https://usn.ubuntu.com/1430-3/
reference_id USN-1430-3
reference_type
scores
url https://usn.ubuntu.com/1430-3/
fixed_packages
aliases CVE-2012-0471
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdt4-m7fr-q3hm
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.4-1%3Farch=el5_8