Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-libs/nss@3.28
Typeebuild
Namespacedev-libs
Namenss
Version3.28
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.29.5
Latest_non_vulnerable_version10.0.11
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9mux-fuyc-a7dx
vulnerability_id VCID-9mux-fuyc-a7dx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
reference_id
reference_type
scores
0
value 0.01048
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-13T12:55:00Z
1
value 0.01048
scoring_system epss
scoring_elements 0.77455
published_at 2026-04-01T12:55:00Z
2
value 0.01048
scoring_system epss
scoring_elements 0.77506
published_at 2026-04-09T12:55:00Z
3
value 0.01048
scoring_system epss
scoring_elements 0.77532
published_at 2026-04-11T12:55:00Z
4
value 0.01048
scoring_system epss
scoring_elements 0.77516
published_at 2026-04-12T12:55:00Z
5
value 0.01048
scoring_system epss
scoring_elements 0.77461
published_at 2026-04-02T12:55:00Z
6
value 0.01048
scoring_system epss
scoring_elements 0.77486
published_at 2026-04-04T12:55:00Z
7
value 0.01048
scoring_system epss
scoring_elements 0.77467
published_at 2026-04-07T12:55:00Z
8
value 0.01048
scoring_system epss
scoring_elements 0.77497
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
5
reference_url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
13
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
14
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
15
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
16
reference_url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
reference_id
reference_type
scores
url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.securityfocus.com/bid/81955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81955
21
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
22
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
23
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
24
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
25
reference_url http://www.ubuntu.com/usn/USN-2903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-1
26
reference_url http://www.ubuntu.com/usn/USN-2903-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-2
27
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
reference_id 1305159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
36
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
37
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
38
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
reference_id mfsa2016-07
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
39
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
40
reference_url https://usn.ubuntu.com/2903-1/
reference_id USN-2903-1
reference_type
scores
url https://usn.ubuntu.com/2903-1/
41
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.22.2
purl pkg:ebuild/dev-libs/nss@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.22.2
1
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
2
url pkg:ebuild/dev-libs/nss@4.12
purl pkg:ebuild/dev-libs/nss@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@4.12
aliases CVE-2016-1938
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mux-fuyc-a7dx
1
url VCID-ekxy-vaed-u7cg
vulnerability_id VCID-ekxy-vaed-u7cg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird the worst of which could lead to the execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-13T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79074
published_at 2026-04-04T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-07T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-08T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-09T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-11T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.79101
published_at 2026-04-12T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79041
published_at 2026-04-01T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79047
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.debian.org/security/2016/dsa-3730
reference_id
reference_type
scores
url https://www.debian.org/security/2016/dsa-3730
13
reference_url https://www.mozilla.org/security/advisories/mfsa2016-89/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-89/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2016-90/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-90/
15
reference_url https://www.mozilla.org/security/advisories/mfsa2016-93/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-93/
16
reference_url http://www.securityfocus.com/bid/94341
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94341
17
reference_url http://www.securitytracker.com/id/1037298
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
reference_id 1396548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
reference_id CVE-2016-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
23
reference_url https://security.gentoo.org/glsa/201701-15
reference_id GLSA-201701-15
reference_type
scores
url https://security.gentoo.org/glsa/201701-15
24
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
reference_id mfsa2016-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
reference_id mfsa2016-90
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
reference_id mfsa2016-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
28
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
aliases CVE-2016-9074
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ekxy-vaed-u7cg
2
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.22.2
purl pkg:ebuild/dev-libs/nss@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.22.2
1
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
2
url pkg:ebuild/dev-libs/nss@4.12
purl pkg:ebuild/dev-libs/nss@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@4.12
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
3
url VCID-pc13-zwmr-p7hz
vulnerability_id VCID-pc13-zwmr-p7hz
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61508
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61582
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61612
published_at 2026-04-04T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61583
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61631
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61667
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61656
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61636
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
reference_id 1391818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
aliases CVE-2016-8635
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pc13-zwmr-p7hz
4
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.22.2
purl pkg:ebuild/dev-libs/nss@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.22.2
1
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
2
url pkg:ebuild/dev-libs/nss@4.12
purl pkg:ebuild/dev-libs/nss@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@4.12
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
5
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
2
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
3
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
4
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.22.2
purl pkg:ebuild/dev-libs/nss@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.22.2
1
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
2
url pkg:ebuild/dev-libs/nss@4.12
purl pkg:ebuild/dev-libs/nss@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@4.12
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
6
url VCID-ukuz-m6d3-5kab
vulnerability_id VCID-ukuz-m6d3-5kab
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
reference_id
reference_type
scores
0
value 0.01626
scoring_system epss
scoring_elements 0.81796
published_at 2026-04-01T12:55:00Z
1
value 0.01626
scoring_system epss
scoring_elements 0.81806
published_at 2026-04-02T12:55:00Z
2
value 0.01626
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-04T12:55:00Z
3
value 0.01626
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-07T12:55:00Z
4
value 0.01626
scoring_system epss
scoring_elements 0.81852
published_at 2026-04-08T12:55:00Z
5
value 0.01626
scoring_system epss
scoring_elements 0.81859
published_at 2026-04-09T12:55:00Z
6
value 0.01626
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-11T12:55:00Z
7
value 0.01626
scoring_system epss
scoring_elements 0.81866
published_at 2026-04-12T12:55:00Z
8
value 0.01626
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
reference_id 1383883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:ebuild/dev-libs/nss@3.28
purl pkg:ebuild/dev-libs/nss@3.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28
aliases CVE-2016-5285
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukuz-m6d3-5kab
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.28