Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/75587?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "type": "ebuild", "namespace": "mail-client", "name": "thunderbird-bin", "version": "38.5.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "38.7.0", "latest_non_vulnerable_version": "128.9.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41205?format=api", "vulnerability_id": "VCID-1b4y-74dy-bfg3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79343", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79353", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2738" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b4y-74dy-bfg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41187?format=api", "vulnerability_id": "VCID-1k4n-9zjx-d3bu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78814", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78827", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78865", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2736" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1k4n-9zjx-d3bu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41101?format=api", "vulnerability_id": "VCID-1p76-9qmf-bqgm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77799", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77773", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.778", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2727" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236950", "reference_id": "1236950", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727", "reference_id": "CVE-2015-2727", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-60", "reference_id": "mfsa2015-60", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-60" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2727" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1p76-9qmf-bqgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41006?format=api", "vulnerability_id": "VCID-28k4-mp17-xbcu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0806.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0806" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078", "reference_id": "1207078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806", "reference_id": "CVE-2015-0806", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38", "reference_id": "mfsa2015-38", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0806" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28k4-mp17-xbcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41252?format=api", "vulnerability_id": "VCID-2v2n-95e7-d7gw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82663", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82611", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82656", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7210" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1218326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1218326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-138.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-138.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79283" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291585", "reference_id": "1291585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291585" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7210", "reference_id": "CVE-2015-7210", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7210" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-138", "reference_id": "mfsa2015-138", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7210" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2n-95e7-d7gw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41223?format=api", "vulnerability_id": "VCID-2w9f-avet-g7c5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.8974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89709", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05021", "scoring_system": "epss", "scoring_elements": "0.89733", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7181" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa119" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1192028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1192028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3688", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3688" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/77416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77416" }, { "reference_url": "http://www.securityfocus.com/bid/91787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91787" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2791-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2791-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269345", "reference_id": "1269345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269345" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7181", "reference_id": "CVE-2015-7181", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7181" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133", "reference_id": "mfsa2015-133", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1980", "reference_id": "RHSA-2015:1980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1981", "reference_id": "RHSA-2015:1981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2068", "reference_id": "RHSA-2015:2068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2068" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2791-1/", "reference_id": "USN-2791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2791-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79276?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@3.22.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/79277?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/79278?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0" } ], "aliases": [ "CVE-2015-7181" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w9f-avet-g7c5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41035?format=api", "vulnerability_id": "VCID-3mb3-bgdt-jfgv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0814.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.8315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01881", "scoring_system": "epss", "scoring_elements": "0.83155", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0814" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207070", "reference_id": "1207070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814", "reference_id": "CVE-2015-0814", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30", "reference_id": "mfsa2015-30", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0814" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3mb3-bgdt-jfgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41240?format=api", "vulnerability_id": "VCID-3sp3-efj9-5qaj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7198.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7198.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88252", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88305", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88316", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.883", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7198" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1188010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1188010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350", "reference_id": "1277350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7198", "reference_id": "CVE-2015-7198", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7198" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131", "reference_id": "mfsa2015-131", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7198" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sp3-efj9-5qaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41227?format=api", "vulnerability_id": "VCID-42u7-k34s-eug1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.8202", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82102", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82049", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01664", "scoring_system": "epss", "scoring_elements": "0.82083", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7188" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1199430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1199430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-122.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-122.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277343", "reference_id": "1277343", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277343" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7188", "reference_id": "CVE-2015-7188", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7188" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-122", "reference_id": "mfsa2015-122", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7188" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42u7-k34s-eug1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41255?format=api", "vulnerability_id": "VCID-4ug8-hyz3-1uam", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7212.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84715", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84744", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7212" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1222809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1222809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3432" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-139.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-139.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2859-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291587", "reference_id": "1291587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7212", "reference_id": "CVE-2015-7212", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7212" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-139", "reference_id": "mfsa2015-139", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0001", "reference_id": "RHSA-2016:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0001" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" }, { "reference_url": "https://usn.ubuntu.com/2859-1/", "reference_id": "USN-2859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7212" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ug8-hyz3-1uam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41000?format=api", "vulnerability_id": "VCID-55jd-xx14-d3h3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99123", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086", "reference_id": "1207086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802", "reference_id": "CVE-2015-0802", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb", "reference_id": "CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42", "reference_id": "mfsa2015-42", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0802" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41098?format=api", "vulnerability_id": "VCID-5ssj-d94q-yfby", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2726.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79333", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7935", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2726" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236948", "reference_id": "1236948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726", "reference_id": "CVE-2015-2726", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59", "reference_id": "mfsa2015-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2726" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ssj-d94q-yfby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41264?format=api", "vulnerability_id": "VCID-5yzn-d698-afc1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7220.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7220.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7220", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81028", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81012", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7220" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178033" }, { "reference_url": "https://hg.mozilla.org/mozilla-central/rev/e4b9e72f934f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hg.mozilla.org/mozilla-central/rev/e4b9e72f934f" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593", "reference_id": "1291593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220", "reference_id": "CVE-2015-7220", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7220", "reference_id": "CVE-2015-7220", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7220" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144", "reference_id": "mfsa2015-144", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7220" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzn-d698-afc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41243?format=api", "vulnerability_id": "VCID-6f4h-mcwj-nkd6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81543", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81479", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.8155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.8149", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81537", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01575", "scoring_system": "epss", "scoring_elements": "0.81542", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7201" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203135" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1224100", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1224100" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1225250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1225250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3432" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-134.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-134.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2859-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291571", "reference_id": "1291571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291571" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7201", "reference_id": "CVE-2015-7201", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7201" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-134", "reference_id": "mfsa2015-134", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0001", "reference_id": "RHSA-2016:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0001" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" }, { "reference_url": "https://usn.ubuntu.com/2859-1/", "reference_id": "USN-2859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7201" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6f4h-mcwj-nkd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41238?format=api", "vulnerability_id": "VCID-75hu-brg5-cqh1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7196.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85182", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85187", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85173", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7196" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1140616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1140616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-130.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-130.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277349", "reference_id": "1277349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277349" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7196", "reference_id": "CVE-2015-7196", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7196" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-130", "reference_id": "mfsa2015-130", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7196" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75hu-brg5-cqh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40998?format=api", "vulnerability_id": "VCID-7gzd-vyba-bfbs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29252", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29127", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0799" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208731", "reference_id": "1208731", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799", "reference_id": "CVE-2015-0799", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-44", "reference_id": "mfsa2015-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-44" }, { "reference_url": "https://usn.ubuntu.com/2557-1/", "reference_id": "USN-2557-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2557-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0799" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gzd-vyba-bfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41241?format=api", "vulnerability_id": "VCID-7x32-gd81-r7hb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7199.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7199.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85364", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85443", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85377", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85399", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.8542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0253", "scoring_system": "epss", "scoring_elements": "0.85429", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350", "reference_id": "1277350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7199", "reference_id": "CVE-2015-7199", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7199" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131", "reference_id": "mfsa2015-131", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7199" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7x32-gd81-r7hb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41214?format=api", "vulnerability_id": "VCID-7yp8-9btm-zqgn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7771", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77786", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236964", "reference_id": "1236964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236964" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-69", "reference_id": "mfsa2015-69", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-69" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2743" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp8-9btm-zqgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41112?format=api", "vulnerability_id": "VCID-82k6-qk5e-cuag", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61539", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61548", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952", "reference_id": "1236952", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729", "reference_id": "CVE-2015-2729", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62", "reference_id": "mfsa2015-62", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2729" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41237?format=api", "vulnerability_id": "VCID-86e3-nbmx-xkfb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7195.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68374", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68309", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.6842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68329", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68325", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68393", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7195" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1211871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1211871" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-129.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-129.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277348", "reference_id": "1277348", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277348" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195", "reference_id": "CVE-2015-7195", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7195", "reference_id": "CVE-2015-7195", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7195" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-129", "reference_id": "mfsa2015-129", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-129" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7195" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-86e3-nbmx-xkfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41262?format=api", "vulnerability_id": "VCID-8k6u-3apv-wye1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7219.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.7941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79381", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79403", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7219" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194820" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-142.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-142.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291590", "reference_id": "1291590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291590" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219", "reference_id": "CVE-2015-7219", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7219", "reference_id": "CVE-2015-7219", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7219" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-142", "reference_id": "mfsa2015-142", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-142" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7219" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k6u-3apv-wye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40997?format=api", "vulnerability_id": "VCID-9gpb-1jc2-f7f5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0798", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80883", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80826", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80856", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80891", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0798" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0798", "reference_id": "CVE-2015-0798", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0798" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-43", "reference_id": "mfsa2015-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-43" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0798" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpb-1jc2-f7f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41008?format=api", "vulnerability_id": "VCID-9n5g-6m3r-3uez", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72096", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72058", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72078", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72092", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72111", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0808" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207075", "reference_id": "1207075", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808", "reference_id": "CVE-2015-0808", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-36", "reference_id": "mfsa2015-36", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-36" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0808" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5g-6m3r-3uez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41242?format=api", "vulnerability_id": "VCID-9yag-27hn-skgx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7200.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84632", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84715", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84668", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.8469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02289", "scoring_system": "epss", "scoring_elements": "0.84697", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7200" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-131.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350", "reference_id": "1277350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277350" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7200", "reference_id": "CVE-2015-7200", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7200" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131", "reference_id": "mfsa2015-131", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7200" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yag-27hn-skgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41246?format=api", "vulnerability_id": "VCID-a2fb-cz2r-kudj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7202.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7202.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7202", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83311", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83248", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83263", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83262", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83296", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7202" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1188105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1188105" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193757" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193999" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194002" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194006" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197012" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1200580", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1200580" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1207571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1207571" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208059", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208059" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212305" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1219330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1219330" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221421" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221904", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221904" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-134.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-134.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291577", "reference_id": "1291577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202", "reference_id": "CVE-2015-7202", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7202", "reference_id": "CVE-2015-7202", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7202" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-134", "reference_id": "mfsa2015-134", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-134" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7202" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2fb-cz2r-kudj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41220?format=api", "vulnerability_id": "VCID-assf-1bj2-pyb6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4514.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82931", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.83005", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82999", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.8296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0185", "scoring_system": "epss", "scoring_elements": "0.82989", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4514" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185157" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1186160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1186160" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1196237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1196237" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1200326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1200326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202677" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205937" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969309" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-116.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-116.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277334", "reference_id": "1277334", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277334" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514", "reference_id": "CVE-2015-4514", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4514", "reference_id": "CVE-2015-4514", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4514" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-116", "reference_id": "mfsa2015-116", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-116" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4514" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-assf-1bj2-pyb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41215?format=api", "vulnerability_id": "VCID-bdjz-rqmx-83gz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30832", "scoring_system": "epss", "scoring_elements": "0.96729", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30832", "scoring_system": "epss", "scoring_elements": "0.96723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30832", "scoring_system": "epss", "scoring_elements": "0.96724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30832", "scoring_system": "epss", "scoring_elements": "0.96726", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.36986", "scoring_system": "epss", "scoring_elements": "0.9714", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.36986", "scoring_system": "epss", "scoring_elements": "0.97133", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.36986", "scoring_system": "epss", "scoring_elements": "0.97139", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.36986", "scoring_system": "epss", "scoring_elements": "0.97126", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101", "reference_id": "1207101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1006", "reference_id": "RHSA-2015:1006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1007", "reference_id": "RHSA-2015:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1020", "reference_id": "RHSA-2015:1020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1021", "reference_id": "RHSA-2015:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1091", "reference_id": "RHSA-2015:1091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1228", "reference_id": "RHSA-2015:1228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1229", "reference_id": "RHSA-2015:1229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1230", "reference_id": "RHSA-2015:1230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241", "reference_id": "RHSA-2015:1241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242", "reference_id": "RHSA-2015:1242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243", "reference_id": "RHSA-2015:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1526", "reference_id": "RHSA-2015:1526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1526" }, { "reference_url": "https://usn.ubuntu.com/2696-1/", "reference_id": "USN-2696-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2696-1/" }, { "reference_url": "https://usn.ubuntu.com/2706-1/", "reference_id": "USN-2706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2706-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2808" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdjz-rqmx-83gz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41258?format=api", "vulnerability_id": "VCID-d9m7-a3y7-uqaa", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7215.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.62986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63108", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63044", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63104", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7215" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1160890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1160890" }, { "reference_url": "https://github.com/whatwg/html/issues/164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/whatwg/html/issues/164" }, { "reference_url": "https://github.com/whatwg/html/pull/166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/whatwg/html/pull/166" }, { "reference_url": "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-140.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291588", "reference_id": "1291588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291588" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215", "reference_id": "CVE-2015-7215", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7215", "reference_id": "CVE-2015-7215", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7215" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-140", "reference_id": "mfsa2015-140", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-140" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7215" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d9m7-a3y7-uqaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41230?format=api", "vulnerability_id": "VCID-ducs-kg2t-7kdp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7189.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7189.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87691", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.8766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03549", "scoring_system": "epss", "scoring_elements": "0.87687", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7189" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-123.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-123.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277344", "reference_id": "1277344", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277344" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7189", "reference_id": "CVE-2015-7189", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7189" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-123", "reference_id": "mfsa2015-123", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7189" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ducs-kg2t-7kdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41005?format=api", "vulnerability_id": "VCID-e193-1kgh-5kda", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078", "reference_id": "1207078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805", "reference_id": "CVE-2015-0805", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38", "reference_id": "mfsa2015-38", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0805" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41250?format=api", "vulnerability_id": "VCID-f11x-jaxy-5ybr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7207.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.62986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63108", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63044", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63104", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7207" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1185256" }, { "reference_url": "https://github.com/w3c/resource-timing/issues/29", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/w3c/resource-timing/issues/29" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-136.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291581", "reference_id": "1291581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291581" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207", "reference_id": "CVE-2015-7207", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7207", "reference_id": "CVE-2015-7207", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7207" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-136", "reference_id": "mfsa2015-136", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-136" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7207" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f11x-jaxy-5ybr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41197?format=api", "vulnerability_id": "VCID-f677-m1p3-nqdq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79343", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79353", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2737" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f677-m1p3-nqdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41217?format=api", "vulnerability_id": "VCID-fasa-11uc-jucq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.9873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98731", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4495" }, { "reference_url": "http://www.securitytracker.com/id/1033216", "reference_id": "1033216", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.securitytracker.com/id/1033216" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251318", "reference_id": "1251318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251318" }, { "reference_url": "https://www.exploit-db.com/exploits/37772/", "reference_id": "37772", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://www.exploit-db.com/exploits/37772/" }, { "reference_url": "http://www.securityfocus.com/bid/76249", "reference_id": "76249", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.securityfocus.com/bid/76249" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495", "reference_id": "CVE-2015-4495", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js", "reference_id": "CVE-2015-4495;OSVDB-125839", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js" }, { "reference_url": "https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/", "reference_id": "firefox-exploit-found-in-the-wild", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-78", "reference_id": "mfsa2015-78", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-78" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-78.html", "reference_id": "mfsa2015-78.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-78.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html", "reference_id": "msg00014.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1581", "reference_id": "RHSA-2015:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1581" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1581.html", "reference_id": "RHSA-2015-1581.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1581.html" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178058", "reference_id": "show_bug.cgi?id=1178058", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178058" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1179262", "reference_id": "show_bug.cgi?id=1179262", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1179262" }, { "reference_url": "https://usn.ubuntu.com/2707-1/", "reference_id": "USN-2707-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2707-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2707-1", "reference_id": "USN-2707-1", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2707-1" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4495" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fasa-11uc-jucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40999?format=api", "vulnerability_id": "VCID-ffrc-3bx6-jbav", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78795", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78815", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7884", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78853", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084", "reference_id": "1207084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40", "reference_id": "mfsa2015-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0801" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41210?format=api", "vulnerability_id": "VCID-fubs-3mtf-77c7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77492", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77503", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77542", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01051", "scoring_system": "epss", "scoring_elements": "0.77553", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2739" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fubs-3mtf-77c7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41268?format=api", "vulnerability_id": "VCID-g6zq-mufw-h3gh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7222.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87268", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87331", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87312", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03351", "scoring_system": "epss", "scoring_elements": "0.87319", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7222" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1216748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1216748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-147.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-147.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291597", "reference_id": "1291597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291597" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7222", "reference_id": "CVE-2015-7222", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7222" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-147", "reference_id": "mfsa2015-147", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7222" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g6zq-mufw-h3gh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41053?format=api", "vulnerability_id": "VCID-gr7k-2v4p-kbfg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99363", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99364", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99365", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072", "reference_id": "1207072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33", "reference_id": "mfsa2015-33", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0816" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41045?format=api", "vulnerability_id": "VCID-grdt-g3kf-3uh3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79362", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79314", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.7933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79373", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068", "reference_id": "1207068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30", "reference_id": "mfsa2015-30", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0815" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41097?format=api", "vulnerability_id": "VCID-gwtj-tnhj-wfev", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2725", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81803", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.8186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01627", "scoring_system": "epss", "scoring_elements": "0.81873", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2725" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947", "reference_id": "1236947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725", "reference_id": "CVE-2015-2725", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59", "reference_id": "mfsa2015-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2725" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwtj-tnhj-wfev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41269?format=api", "vulnerability_id": "VCID-h1my-ggw9-zuft", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7223.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.7305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72974", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73025", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7223" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226423" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-148.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-148.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291599", "reference_id": "1291599", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291599" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223", "reference_id": "CVE-2015-7223", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7223", "reference_id": "CVE-2015-7223", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7223" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-148", "reference_id": "mfsa2015-148", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-148" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7223" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1my-ggw9-zuft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41222?format=api", "vulnerability_id": "VCID-h1z7-68a7-bfa8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4518.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4518.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78501", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.7846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78443", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.7847", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01148", "scoring_system": "epss", "scoring_elements": "0.78475", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4518" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1136692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1136692" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1182778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1182778" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-118.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277339", "reference_id": "1277339", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277339" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518", "reference_id": "CVE-2015-4518", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4518", "reference_id": "CVE-2015-4518", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4518" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-118", "reference_id": "mfsa2015-118", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-118" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4518" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1z7-68a7-bfa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41249?format=api", "vulnerability_id": "VCID-h6wt-azn4-mqfn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75103", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75059", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75069", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75081", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7205" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1220493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1220493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3432" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-145.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-145.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2859-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291595", "reference_id": "1291595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291595" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7205", "reference_id": "CVE-2015-7205", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7205" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-145", "reference_id": "mfsa2015-145", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0001", "reference_id": "RHSA-2016:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0001" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" }, { "reference_url": "https://usn.ubuntu.com/2859-1/", "reference_id": "USN-2859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7205" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h6wt-azn4-mqfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41239?format=api", "vulnerability_id": "VCID-h7mu-heyn-yqch", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7197.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82915", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82848", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82899", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01832", "scoring_system": "epss", "scoring_elements": "0.82907", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7197" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-132.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-132.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277351", "reference_id": "1277351", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277351" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7197", "reference_id": "CVE-2015-7197", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7197" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-132", "reference_id": "mfsa2015-132", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7197" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7mu-heyn-yqch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41015?format=api", "vulnerability_id": "VCID-h7zg-petj-hqfv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0812.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35272", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35151", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3526", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35331", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35295", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0812" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207071", "reference_id": "1207071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207071" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812", "reference_id": "CVE-2015-0812", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-32", "reference_id": "mfsa2015-32", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-32" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0812" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7zg-petj-hqfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41233?format=api", "vulnerability_id": "VCID-hwws-vwt3-yfch", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85784", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85781", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.8574", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.85759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02655", "scoring_system": "epss", "scoring_elements": "0.8577", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7192" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210023" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-126.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-126.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192", "reference_id": "CVE-2015-7192", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7192", "reference_id": "CVE-2015-7192", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7192" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-126", "reference_id": "mfsa2015-126", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-126" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7192" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwws-vwt3-yfch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41122?format=api", "vulnerability_id": "VCID-jmhk-12t1-kugh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.4544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45514", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45536", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45537", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45538", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45527", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954", "reference_id": "1236954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64", "reference_id": "mfsa2015-64", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664", "reference_id": "RHSA-2015:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1699", "reference_id": "RHSA-2015:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1699" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2672-1/", "reference_id": "USN-2672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2672-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2730" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41010?format=api", "vulnerability_id": "VCID-jnj4-g593-37d7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73385", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73443", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073", "reference_id": "1207073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811", "reference_id": "CVE-2015-0811", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34", "reference_id": "mfsa2015-34", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0811" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41251?format=api", "vulnerability_id": "VCID-k1fr-d61m-b7fq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7208.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69985", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69892", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69919", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69897", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7208" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191423" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-137.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-137.html" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-04.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-04.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.securitytracker.com/id/1034825", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034825" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291583", "reference_id": "1291583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291583" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208", "reference_id": "CVE-2015-7208", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7208", "reference_id": "CVE-2015-7208", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7208" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-137", "reference_id": "mfsa2015-137", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-137" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-04", "reference_id": "mfsa2016-04", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-04" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7208" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1fr-d61m-b7fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41130?format=api", "vulnerability_id": "VCID-k6eg-55x2-dyh5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76247", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.7625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76334", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236953", "reference_id": "1236953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236953" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-63", "reference_id": "mfsa2015-63", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-63" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2731" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41211?format=api", "vulnerability_id": "VCID-kj6v-kvbx-33b5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87522", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87548", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87567", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.87585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03486", "scoring_system": "epss", "scoring_elements": "0.8758", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2740" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kj6v-kvbx-33b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41254?format=api", "vulnerability_id": "VCID-ktts-bdwa-c7a7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7211.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71597", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71589", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71565", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71539", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71578", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7211" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221444" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-141.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291589", "reference_id": "1291589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291589" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211", "reference_id": "CVE-2015-7211", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7211", "reference_id": "CVE-2015-7211", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7211" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-141", "reference_id": "mfsa2015-141", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-141" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7211" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktts-bdwa-c7a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41234?format=api", "vulnerability_id": "VCID-kuqd-a9t3-vyam", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79412", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79419", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79466", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7193" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1210302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-127.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277346", "reference_id": "1277346", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277346" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7193", "reference_id": "CVE-2015-7193", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7193" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-127", "reference_id": "mfsa2015-127", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-127" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7193" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuqd-a9t3-vyam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=api", "vulnerability_id": "VCID-kyhs-j9aj-vqft", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79343", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79353", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2734" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41231?format=api", "vulnerability_id": "VCID-mry9-u9gk-4kd5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7191", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.7518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75181", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75169", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7191" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208956" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-125.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-125.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191", "reference_id": "CVE-2015-7191", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7191", "reference_id": "CVE-2015-7191", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7191" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-125", "reference_id": "mfsa2015-125", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-125" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7191" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mry9-u9gk-4kd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41090?format=api", "vulnerability_id": "VCID-mwyu-5rk2-xbbz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69689", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967", "reference_id": "1236967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://security.gentoo.org/glsa/201701-46", "reference_id": "GLSA-201701-46", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-46" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71", "reference_id": "mfsa2015-71", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185", "reference_id": "RHSA-2015:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664", "reference_id": "RHSA-2015:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1664" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2672-1/", "reference_id": "USN-2672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2672-1/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79276?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@3.22.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/79277?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/79278?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0" } ], "aliases": [ "CVE-2015-2721" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41004?format=api", "vulnerability_id": "VCID-mxfp-h13j-kycm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0804.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0804" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081", "reference_id": "1207081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804", "reference_id": "CVE-2015-0804", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39", "reference_id": "mfsa2015-39", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0804" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxfp-h13j-kycm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41003?format=api", "vulnerability_id": "VCID-p7k1-93e6-cfha", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0803" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081", "reference_id": "1207081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803", "reference_id": "CVE-2015-0803", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39", "reference_id": "mfsa2015-39", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0803" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p7k1-93e6-cfha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41248?format=api", "vulnerability_id": "VCID-p9g8-fq9d-5ffz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7204.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7204.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82324", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82401", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82356", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82385", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7204" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1216130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1216130" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-135.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-135.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291578", "reference_id": "1291578", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291578" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204", "reference_id": "CVE-2015-7204", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7204", "reference_id": "CVE-2015-7204", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7204" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-135", "reference_id": "mfsa2015-135", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-135" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7204" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9g8-fq9d-5ffz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41257?format=api", "vulnerability_id": "VCID-pbzg-cqa6-yba5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94623", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94657", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.9466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.9463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15477", "scoring_system": "epss", "scoring_elements": "0.94652", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7214" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1228950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1228950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3432" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-149.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-149.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2859-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291600", "reference_id": "1291600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291600" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7214", "reference_id": "CVE-2015-7214", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7214" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-149", "reference_id": "mfsa2015-149", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0001", "reference_id": "RHSA-2016:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0001" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" }, { "reference_url": "https://usn.ubuntu.com/2859-1/", "reference_id": "USN-2859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7214" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbzg-cqa6-yba5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41176?format=api", "vulnerability_id": "VCID-pdjg-gn54-9bcq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78814", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78827", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01193", "scoring_system": "epss", "scoring_elements": "0.78865", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2735" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pdjg-gn54-9bcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41226?format=api", "vulnerability_id": "VCID-pshp-ks3c-gbbj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7187.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65192", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65111", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.6522", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65161", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65186", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65214", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7187" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1195735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1195735" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-121.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-121.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277342", "reference_id": "1277342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277342" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187", "reference_id": "CVE-2015-7187", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7187", "reference_id": "CVE-2015-7187", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7187" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-121", "reference_id": "mfsa2015-121", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-121" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7187" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pshp-ks3c-gbbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41094?format=api", "vulnerability_id": "VCID-qj59-9xmk-7yg9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84774", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84701", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.8476", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84785", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955", "reference_id": "1236955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722", "reference_id": "CVE-2015-2722", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65", "reference_id": "mfsa2015-65", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2722" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41064?format=api", "vulnerability_id": "VCID-qny5-vvv5-q7f4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78351", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2706" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213935", "reference_id": "1213935", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706", "reference_id": "CVE-2015-2706", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-45", "reference_id": "mfsa2015-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-45" }, { "reference_url": "https://usn.ubuntu.com/2571-1/", "reference_id": "USN-2571-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2571-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2706" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qny5-vvv5-q7f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41225?format=api", "vulnerability_id": "VCID-r1pj-wxzf-5ubj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89359", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89323", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04702", "scoring_system": "epss", "scoring_elements": "0.89358", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7183" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa119" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3406" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/77415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77415" }, { "reference_url": "http://www.securityfocus.com/bid/91787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91787" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2790-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2790-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269353", "reference_id": "1269353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269353" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7183", "reference_id": "CVE-2015-7183", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7183" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133", "reference_id": "mfsa2015-133", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1980", "reference_id": "RHSA-2015:1980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1981", "reference_id": "RHSA-2015:1981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2068", "reference_id": "RHSA-2015:2068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2068" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2790-1/", "reference_id": "USN-2790-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2790-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79276?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@3.22.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/79277?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/79278?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0" } ], "aliases": [ "CVE-2015-7183" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1pj-wxzf-5ubj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41216?format=api", "vulnerability_id": "VCID-r754-82vy-eqh1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97611", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97626", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.4589", "scoring_system": "epss", "scoring_elements": "0.97627", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4153" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/37200.txt", "reference_id": "CVE-2015-4465;OSVDB-122910;CVE-2015-4153", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/37200.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4153" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r754-82vy-eqh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41221?format=api", "vulnerability_id": "VCID-rg6a-eu1e-ruar", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4515.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4515.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4515", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63174", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63175", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63209", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4515" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1046421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1046421" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-117.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-117.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277337", "reference_id": "1277337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515", "reference_id": "CVE-2015-4515", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4515", "reference_id": "CVE-2015-4515", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4515" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-117", "reference_id": "mfsa2015-117", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-117" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4515" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rg6a-eu1e-ruar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=api", "vulnerability_id": "VCID-rzqy-gheq-cqgg", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93743", "scoring_system": "epss", "scoring_elements": "0.99851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.93894", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.93894", "scoring_system": "epss", "scoring_elements": "0.99876", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211", "reference_id": "1223211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "reference_url": "https://security.gentoo.org/glsa/201506-02", "reference_id": "GLSA-201506-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201506-02" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201603-11", "reference_id": "GLSA-201603-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-11" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://security.gentoo.org/glsa/201701-46", "reference_id": "GLSA-201701-46", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-46" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70", "reference_id": "mfsa2015-70", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1072", "reference_id": "RHSA-2015:1072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185", "reference_id": "RHSA-2015:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1197", "reference_id": "RHSA-2015:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1228", "reference_id": "RHSA-2015:1228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1229", "reference_id": "RHSA-2015:1229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1230", "reference_id": "RHSA-2015:1230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241", "reference_id": "RHSA-2015:1241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242", "reference_id": "RHSA-2015:1242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243", "reference_id": "RHSA-2015:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485", "reference_id": "RHSA-2015:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486", "reference_id": "RHSA-2015:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488", "reference_id": "RHSA-2015:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1526", "reference_id": "RHSA-2015:1526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544", "reference_id": "RHSA-2015:1544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604", "reference_id": "RHSA-2015:1604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2056", "reference_id": "RHSA-2016:2056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2056" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" }, { "reference_url": "https://usn.ubuntu.com/2696-1/", "reference_id": "USN-2696-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2696-1/" }, { "reference_url": "https://usn.ubuntu.com/2706-1/", "reference_id": "USN-2706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2706-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79276?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@3.22.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/79277?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/79278?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0" } ], "aliases": [ "CVE-2015-4000" ], "risk_score": 7.2, "exploitability": "2.0", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41138?format=api", "vulnerability_id": "VCID-se7j-tewy-4uah", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2733.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2733.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2733", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85798", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85761", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.8578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.8579", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02666", "scoring_system": "epss", "scoring_elements": "0.85802", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2733" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955", "reference_id": "1236955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733", "reference_id": "CVE-2015-2733", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65", "reference_id": "mfsa2015-65", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2733" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-se7j-tewy-4uah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41260?format=api", "vulnerability_id": "VCID-t6bj-g9k6-23cq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7217.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7217.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7217", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.7976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79731", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79739", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7217" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "reference_url": "http://www.securityfocus.com/bid/79278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79278" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291591", "reference_id": "1291591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291591" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217", "reference_id": "CVE-2015-7217", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7217", "reference_id": "CVE-2015-7217", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7217" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-143", "reference_id": "mfsa2015-143", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-143" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7217" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t6bj-g9k6-23cq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41212?format=api", "vulnerability_id": "VCID-ua69-cwm3-8ubh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62257", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62147", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62237", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62279", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2741" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236963", "reference_id": "1236963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741", "reference_id": "CVE-2015-2741", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-67", "reference_id": "mfsa2015-67", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-67" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2741" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41261?format=api", "vulnerability_id": "VCID-v213-2wvj-effu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.7941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79381", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01259", "scoring_system": "epss", "scoring_elements": "0.79403", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7218" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1194818" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-142.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-142.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291590", "reference_id": "1291590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291590" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218", "reference_id": "CVE-2015-7218", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7218", "reference_id": "CVE-2015-7218", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7218" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-142", "reference_id": "mfsa2015-142", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-142" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7218" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v213-2wvj-effu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41247?format=api", "vulnerability_id": "VCID-vu6n-xcq7-1ya5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7203.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.8207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82006", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82078", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.8204", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82061", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01662", "scoring_system": "epss", "scoring_elements": "0.82068", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7203" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1201183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1201183" }, { "reference_url": "https://hg.mozilla.org/mozilla-central/rev/e1bcc04808cc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hg.mozilla.org/mozilla-central/rev/e1bcc04808cc" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593", "reference_id": "1291593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203", "reference_id": "CVE-2015-7203", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7203", "reference_id": "CVE-2015-7203", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7203" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144", "reference_id": "mfsa2015-144", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7203" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu6n-xcq7-1ya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41025?format=api", "vulnerability_id": "VCID-wh23-7b49-n3g5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86168", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86187", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.86213", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02842", "scoring_system": "epss", "scoring_elements": "0.8621", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207088", "reference_id": "1207088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207088" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-31", "reference_id": "mfsa2015-31", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-31" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0813" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh23-7b49-n3g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41213?format=api", "vulnerability_id": "VCID-wmk8-kk5t-ufdd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.6809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68112", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68186", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742", "reference_id": "CVE-2015-2742", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-68", "reference_id": "mfsa2015-68", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-68" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2742" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wmk8-kk5t-ufdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41259?format=api", "vulnerability_id": "VCID-wtg7-p8my-mufn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7216.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7216.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00892", "scoring_system": "epss", "scoring_elements": "0.75564", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7216" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "reference_url": "http://www.securityfocus.com/bid/79278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79278" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291591", "reference_id": "1291591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291591" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216", "reference_id": "CVE-2015-7216", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7216", "reference_id": "CVE-2015-7216", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7216" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-143", "reference_id": "mfsa2015-143", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-143" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7216" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wtg7-p8my-mufn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41266?format=api", "vulnerability_id": "VCID-xf3p-h83v-vyhv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7221.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7221.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7221", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81028", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.80976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01483", "scoring_system": "epss", "scoring_elements": "0.81012", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7221" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1199400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1199400" }, { "reference_url": "https://hg.mozilla.org/mozilla-central/rev/7fd961937687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hg.mozilla.org/mozilla-central/rev/7fd961937687" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-144.html" }, { "reference_url": "http://www.securityfocus.com/bid/79280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79280" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593", "reference_id": "1291593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291593" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221", "reference_id": "CVE-2015-7221", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7221", "reference_id": "CVE-2015-7221", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7221" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144", "reference_id": "mfsa2015-144", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-144" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7221" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xf3p-h83v-vyhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=api", "vulnerability_id": "VCID-xjf8-mc7t-hfah", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947", "reference_id": "1236947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59", "reference_id": "mfsa2015-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2724" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41235?format=api", "vulnerability_id": "VCID-xnen-brn4-vqgp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7194.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7194.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.8563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85623", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7194" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1211262", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1211262" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-128.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-128.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277347", "reference_id": "1277347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277347" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7194", "reference_id": "CVE-2015-7194", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7194" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-128", "reference_id": "mfsa2015-128", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7194" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnen-brn4-vqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41109?format=api", "vulnerability_id": "VCID-xqxf-cnpj-3qas", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77751", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951", "reference_id": "1236951", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61", "reference_id": "mfsa2015-61", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-2728" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41256?format=api", "vulnerability_id": "VCID-ycdw-d6fb-9fa6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2657.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7213.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85174", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85172", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.8511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02438", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7213" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3422" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3432" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-146.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/79279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79279" }, { "reference_url": "http://www.securitytracker.com/id/1034426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034426" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2833-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2859-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291596", "reference_id": "1291596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291596" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7213", "reference_id": "CVE-2015-7213", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7213" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-146", "reference_id": "mfsa2015-146", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2657", "reference_id": "RHSA-2015:2657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0001", "reference_id": "RHSA-2016:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0001" }, { "reference_url": "https://usn.ubuntu.com/2833-1/", "reference_id": "USN-2833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2833-1/" }, { "reference_url": "https://usn.ubuntu.com/2859-1/", "reference_id": "USN-2859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-7213" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycdw-d6fb-9fa6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41009?format=api", "vulnerability_id": "VCID-yq8w-7uvd-dyhk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60323", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60398", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60459", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60465", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810", "reference_id": "CVE-2015-0810", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-35", "reference_id": "mfsa2015-35", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-35" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0810" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8w-7uvd-dyhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41007?format=api", "vulnerability_id": "VCID-ys1x-t7un-ayhr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33543", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076", "reference_id": "1207076", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37", "reference_id": "mfsa2015-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-0807" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41224?format=api", "vulnerability_id": "VCID-z26z-btvf-x7eq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93433", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93439", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11044", "scoring_system": "epss", "scoring_elements": "0.93429", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7182" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa119" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3688", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3688" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/77416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77416" }, { "reference_url": "http://www.securityfocus.com/bid/91787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91787" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2791-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2791-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269351", "reference_id": "1269351", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269351" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7182", "reference_id": "CVE-2015-7182", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7182" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133", "reference_id": "mfsa2015-133", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1980", "reference_id": "RHSA-2015:1980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1981", "reference_id": "RHSA-2015:1981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2068", "reference_id": "RHSA-2015:2068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2068" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2791-1/", "reference_id": "USN-2791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2791-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79276?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@3.22.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/79277?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/79278?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0" } ], "aliases": [ "CVE-2015-7182" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z26z-btvf-x7eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41218?format=api", "vulnerability_id": "VCID-zhyg-avrd-z7gu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1982.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2519.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.8373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83725", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4513" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1107011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1107011" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1191942" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193038" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204580", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204580" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204669" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1204700" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205707" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206564" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1208665" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1209471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1209471" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1213979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1213979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3393" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3410" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-116.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-116.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/77411", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77411" }, { "reference_url": "http://www.securitytracker.com/id/1034069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034069" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2785-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2819-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2819-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277332", "reference_id": "1277332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277332" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4513", "reference_id": "CVE-2015-4513", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4513" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-116", "reference_id": "mfsa2015-116", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-116" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1982", "reference_id": "RHSA-2015:1982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2519", "reference_id": "RHSA-2015:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2519" }, { "reference_url": "https://usn.ubuntu.com/2785-1/", "reference_id": "USN-2785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2785-1/" }, { "reference_url": "https://usn.ubuntu.com/2819-1/", "reference_id": "USN-2819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2819-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75587?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@38.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" } ], "aliases": [ "CVE-2015-4513" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhyg-avrd-z7gu" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0" }