Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/nspr@4.8.6-1%2Bsqueeze1
Typedeb
Namespacedebian
Namenspr
Version4.8.6-1+squeeze1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:4.12-1+debu8u1
Latest_non_vulnerable_version2:4.12-1+debu8u1
Affected_by_vulnerabilities
0
url VCID-49hp-8pm6-vkhr
vulnerability_id VCID-49hp-8pm6-vkhr
summary security update
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1545
reference_id
reference_type
scores
0
value 0.02889
scoring_system epss
scoring_elements 0.8633
published_at 2026-04-16T12:55:00Z
1
value 0.02889
scoring_system epss
scoring_elements 0.86249
published_at 2026-04-01T12:55:00Z
2
value 0.02889
scoring_system epss
scoring_elements 0.86318
published_at 2026-04-12T12:55:00Z
3
value 0.02889
scoring_system epss
scoring_elements 0.86314
published_at 2026-04-13T12:55:00Z
4
value 0.02889
scoring_system epss
scoring_elements 0.86258
published_at 2026-04-02T12:55:00Z
5
value 0.02889
scoring_system epss
scoring_elements 0.86276
published_at 2026-04-04T12:55:00Z
6
value 0.02889
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-07T12:55:00Z
7
value 0.02889
scoring_system epss
scoring_elements 0.86296
published_at 2026-04-08T12:55:00Z
8
value 0.02889
scoring_system epss
scoring_elements 0.86306
published_at 2026-04-09T12:55:00Z
9
value 0.02889
scoring_system epss
scoring_elements 0.8632
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1545
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1018783
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1018783
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
13
reference_url http://secunia.com/advisories/58984
reference_id
reference_type
scores
url http://secunia.com/advisories/58984
14
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
15
reference_url http://secunia.com/advisories/59275
reference_id
reference_type
scores
url http://secunia.com/advisories/59275
16
reference_url http://secunia.com/advisories/59318
reference_id
reference_type
scores
url http://secunia.com/advisories/59318
17
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
18
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
19
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
20
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
21
reference_url http://secunia.com/advisories/59614
reference_id
reference_type
scores
url http://secunia.com/advisories/59614
22
reference_url http://www.debian.org/security/2014/dsa-2955
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2955
23
reference_url http://www.debian.org/security/2014/dsa-2960
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2960
24
reference_url http://www.debian.org/security/2014/dsa-2962
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2962
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-55.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-55.html
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
28
reference_url http://www.securityfocus.com/bid/67975
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67975
29
reference_url http://www.securitytracker.com/id/1030404
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030404
30
reference_url http://www.ubuntu.com/usn/USN-2265-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2265-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107432
reference_id 1107432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107432
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1545
reference_id CVE-2014-1545
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1545
78
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
79
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-55
reference_id mfsa2014-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-55
80
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
81
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
82
reference_url https://usn.ubuntu.com/2265-1/
reference_id USN-2265-1
reference_type
scores
url https://usn.ubuntu.com/2265-1/
fixed_packages
0
url pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
purl pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-49hp-8pm6-vkhr
1
vulnerability VCID-97rg-h7t5-1fhs
2
vulnerability VCID-ap6c-9pta-wbdz
3
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.9.2-1%252Bdeb7u3
1
url pkg:deb/debian/nspr@2:4.10.7-1
purl pkg:deb/debian/nspr@2:4.10.7-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ap6c-9pta-wbdz
1
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.10.7-1
aliases CVE-2014-1545
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49hp-8pm6-vkhr
1
url VCID-97rg-h7t5-1fhs
vulnerability_id VCID-97rg-h7t5-1fhs
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5607
reference_id
reference_type
scores
0
value 0.01591
scoring_system epss
scoring_elements 0.81691
published_at 2026-04-16T12:55:00Z
1
value 0.01591
scoring_system epss
scoring_elements 0.8159
published_at 2026-04-01T12:55:00Z
2
value 0.01591
scoring_system epss
scoring_elements 0.81601
published_at 2026-04-02T12:55:00Z
3
value 0.01591
scoring_system epss
scoring_elements 0.81622
published_at 2026-04-04T12:55:00Z
4
value 0.01591
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-07T12:55:00Z
5
value 0.01591
scoring_system epss
scoring_elements 0.81647
published_at 2026-04-08T12:55:00Z
6
value 0.01591
scoring_system epss
scoring_elements 0.81652
published_at 2026-04-09T12:55:00Z
7
value 0.01591
scoring_system epss
scoring_elements 0.81673
published_at 2026-04-11T12:55:00Z
8
value 0.01591
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-12T12:55:00Z
9
value 0.01591
scoring_system epss
scoring_elements 0.81653
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031461
reference_id 1031461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031461
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
10
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
11
reference_url https://usn.ubuntu.com/2087-1/
reference_id USN-2087-1
reference_type
scores
url https://usn.ubuntu.com/2087-1/
fixed_packages
0
url pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
purl pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-49hp-8pm6-vkhr
1
vulnerability VCID-97rg-h7t5-1fhs
2
vulnerability VCID-ap6c-9pta-wbdz
3
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.9.2-1%252Bdeb7u3
1
url pkg:deb/debian/nspr@2:4.10.7-1
purl pkg:deb/debian/nspr@2:4.10.7-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ap6c-9pta-wbdz
1
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.10.7-1
aliases CVE-2013-5607
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97rg-h7t5-1fhs
2
url VCID-ap6c-9pta-wbdz
vulnerability_id VCID-ap6c-9pta-wbdz
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1951.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1951
reference_id
reference_type
scores
0
value 0.00823
scoring_system epss
scoring_elements 0.74472
published_at 2026-04-16T12:55:00Z
1
value 0.00823
scoring_system epss
scoring_elements 0.74435
published_at 2026-04-13T12:55:00Z
2
value 0.00823
scoring_system epss
scoring_elements 0.74386
published_at 2026-04-01T12:55:00Z
3
value 0.00823
scoring_system epss
scoring_elements 0.7439
published_at 2026-04-02T12:55:00Z
4
value 0.00823
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-04T12:55:00Z
5
value 0.00823
scoring_system epss
scoring_elements 0.74392
published_at 2026-04-07T12:55:00Z
6
value 0.00823
scoring_system epss
scoring_elements 0.74425
published_at 2026-04-08T12:55:00Z
7
value 0.00823
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-09T12:55:00Z
8
value 0.00823
scoring_system epss
scoring_elements 0.74463
published_at 2026-04-11T12:55:00Z
9
value 0.00823
scoring_system epss
scoring_elements 0.74443
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311126
reference_id 1311126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311126
5
reference_url https://security.archlinux.org/AVG-933
reference_id AVG-933
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-933
6
reference_url https://usn.ubuntu.com/3023-1/
reference_id USN-3023-1
reference_type
scores
url https://usn.ubuntu.com/3023-1/
7
reference_url https://usn.ubuntu.com/3028-1/
reference_id USN-3028-1
reference_type
scores
url https://usn.ubuntu.com/3028-1/
fixed_packages
0
url pkg:deb/debian/nspr@2:4.12-1%2Bdebu8u1
purl pkg:deb/debian/nspr@2:4.12-1%2Bdebu8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.12-1%252Bdebu8u1
aliases CVE-2016-1951
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap6c-9pta-wbdz
3
url VCID-r1pj-wxzf-5ubj
vulnerability_id VCID-r1pj-wxzf-5ubj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
reference_id
reference_type
scores
0
value 0.04702
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-16T12:55:00Z
1
value 0.04702
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-01T12:55:00Z
2
value 0.04702
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-12T12:55:00Z
3
value 0.04702
scoring_system epss
scoring_elements 0.89359
published_at 2026-04-13T12:55:00Z
4
value 0.04702
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-02T12:55:00Z
5
value 0.04702
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-04T12:55:00Z
6
value 0.04702
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-07T12:55:00Z
7
value 0.04702
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-08T12:55:00Z
8
value 0.04702
scoring_system epss
scoring_elements 0.89358
published_at 2026-04-09T12:55:00Z
9
value 0.04702
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
27
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
30
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
31
reference_url http://www.debian.org/security/2015/dsa-3406
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3406
32
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
35
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
37
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
38
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
39
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
40
reference_url http://www.securityfocus.com/bid/77415
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77415
41
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
42
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
43
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
44
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
45
reference_url http://www.ubuntu.com/usn/USN-2790-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2790-1
46
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
reference_id 1269353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
reference_id CVE-2015-7183
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
60
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
61
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
63
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
64
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
65
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
66
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
67
reference_url https://usn.ubuntu.com/2790-1/
reference_id USN-2790-1
reference_type
scores
url https://usn.ubuntu.com/2790-1/
68
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
purl pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-49hp-8pm6-vkhr
1
vulnerability VCID-97rg-h7t5-1fhs
2
vulnerability VCID-ap6c-9pta-wbdz
3
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.9.2-1%252Bdeb7u3
1
url pkg:deb/debian/nspr@2:4.12-1%2Bdebu8u1
purl pkg:deb/debian/nspr@2:4.12-1%2Bdebu8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@2:4.12-1%252Bdebu8u1
aliases CVE-2015-7183
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1pj-wxzf-5ubj
Fixing_vulnerabilities
0
url VCID-2jhf-j64s-gygy
vulnerability_id VCID-2jhf-j64s-gygy
summary
Security researcher Alin Rad Pop of Secunia
Research reported a heap-based buffer overflow in Mozilla's string to
floating point number conversion routines.  Using this vulnerability
an attacker could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number which
would result in improper memory allocation and the execution of an
arbitrary memory location.  This vulnerability could thus be leveraged
by the attacker to run arbitrary code on a victim's computer.Update: The underlying flaw in the dtoa routines used
by Mozilla appears to be essentially the same as that reported against the
libc gdtoa routine by Maksymilian Arciemowicz.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
reference_id
reference_type
scores
0
value 0.4176
scoring_system epss
scoring_elements 0.97429
published_at 2026-04-16T12:55:00Z
1
value 0.4176
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-01T12:55:00Z
2
value 0.4176
scoring_system epss
scoring_elements 0.97419
published_at 2026-04-11T12:55:00Z
3
value 0.4176
scoring_system epss
scoring_elements 0.97421
published_at 2026-04-13T12:55:00Z
4
value 0.4176
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-02T12:55:00Z
5
value 0.4176
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-04T12:55:00Z
6
value 0.4176
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-07T12:55:00Z
7
value 0.4176
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-08T12:55:00Z
8
value 0.4176
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=539784
reference_id 539784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=539784
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
reference_id CVE-2009-0689
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
reference_id CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
8
reference_url https://www.securityfocus.com/bid/37078/info
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://www.securityfocus.com/bid/37078/info
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
11
reference_url https://www.securityfocus.com/bid/37080/info
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://www.securityfocus.com/bid/37080/info
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
13
reference_url https://www.securityfocus.com/bid/36851/info
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://www.securityfocus.com/bid/36851/info
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
reference_id CVE-2009-0689;OSVDB-62402
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
17
reference_url https://www.securityfocus.com/bid/35510/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/35510/info
18
reference_url https://www.securityfocus.com/bid/37687/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/37687/info
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
20
reference_url https://www.securityfocus.com/bid/37688/info
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://www.securityfocus.com/bid/37688/info
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
reference_id mfsa2009-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
reference_id OSVDB-61189;CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
23
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
24
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
25
reference_url https://access.redhat.com/errata/RHSA-2009:1601
reference_id RHSA-2009:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1601
26
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
27
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
28
reference_url https://access.redhat.com/errata/RHSA-2014:0311
reference_id RHSA-2014:0311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0311
29
reference_url https://access.redhat.com/errata/RHSA-2014:0312
reference_id RHSA-2014:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0312
30
reference_url https://usn.ubuntu.com/871-1/
reference_id USN-871-1
reference_type
scores
url https://usn.ubuntu.com/871-1/
31
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
0
url pkg:deb/debian/nspr@4.8.6-1%2Bsqueeze1
purl pkg:deb/debian/nspr@4.8.6-1%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-49hp-8pm6-vkhr
1
vulnerability VCID-97rg-h7t5-1fhs
2
vulnerability VCID-ap6c-9pta-wbdz
3
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@4.8.6-1%252Bsqueeze1
aliases CVE-2009-0689
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jhf-j64s-gygy
1
url VCID-53kn-ev4f-dufh
vulnerability_id VCID-53kn-ev4f-dufh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
reference_id
reference_type
scores
0
value 0.0522
scoring_system epss
scoring_elements 0.89961
published_at 2026-04-16T12:55:00Z
1
value 0.0522
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-12T12:55:00Z
2
value 0.0522
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-13T12:55:00Z
3
value 0.0522
scoring_system epss
scoring_elements 0.89905
published_at 2026-04-01T12:55:00Z
4
value 0.0522
scoring_system epss
scoring_elements 0.89909
published_at 2026-04-02T12:55:00Z
5
value 0.0522
scoring_system epss
scoring_elements 0.89921
published_at 2026-04-04T12:55:00Z
6
value 0.0522
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-07T12:55:00Z
7
value 0.0522
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-08T12:55:00Z
8
value 0.0522
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-09T12:55:00Z
9
value 0.0522
scoring_system epss
scoring_elements 0.89957
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512131
reference_id 512131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
reference_id CVE-2009-2463
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
8
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
9
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
10
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
11
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
12
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
0
url pkg:deb/debian/nspr@4.8.6-1%2Bsqueeze1
purl pkg:deb/debian/nspr@4.8.6-1%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-49hp-8pm6-vkhr
1
vulnerability VCID-97rg-h7t5-1fhs
2
vulnerability VCID-ap6c-9pta-wbdz
3
vulnerability VCID-r1pj-wxzf-5ubj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@4.8.6-1%252Bsqueeze1
aliases CVE-2009-2463
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53kn-ev4f-dufh
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/nspr@4.8.6-1%252Bsqueeze1