Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/seamonkey@31.5.0
Typeebuild
Namespacewww-client
Nameseamonkey
Version31.5.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version31.5.3
Latest_non_vulnerable_version31.5.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-18ut-jmww-bffq
vulnerability_id VCID-18ut-jmww-bffq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5591
reference_id
reference_type
scores
0
value 0.03454
scoring_system epss
scoring_elements 0.87519
published_at 2026-04-13T12:55:00Z
1
value 0.03454
scoring_system epss
scoring_elements 0.87463
published_at 2026-04-01T12:55:00Z
2
value 0.03454
scoring_system epss
scoring_elements 0.87473
published_at 2026-04-02T12:55:00Z
3
value 0.03454
scoring_system epss
scoring_elements 0.87487
published_at 2026-04-04T12:55:00Z
4
value 0.03454
scoring_system epss
scoring_elements 0.8749
published_at 2026-04-07T12:55:00Z
5
value 0.03454
scoring_system epss
scoring_elements 0.87509
published_at 2026-04-08T12:55:00Z
6
value 0.03454
scoring_system epss
scoring_elements 0.87516
published_at 2026-04-09T12:55:00Z
7
value 0.03454
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-11T12:55:00Z
8
value 0.03454
scoring_system epss
scoring_elements 0.87523
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5591
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023846
reference_id 1023846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023846
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591
reference_id CVE-2013-5591
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
reference_id mfsa2013-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
6
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
7
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5591
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18ut-jmww-bffq
1
url VCID-1ert-2qyc-cfc1
vulnerability_id VCID-1ert-2qyc-cfc1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
reference_id
reference_type
scores
0
value 0.00829
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-13T12:55:00Z
1
value 0.00829
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-01T12:55:00Z
2
value 0.00829
scoring_system epss
scoring_elements 0.74474
published_at 2026-04-02T12:55:00Z
3
value 0.00829
scoring_system epss
scoring_elements 0.745
published_at 2026-04-04T12:55:00Z
4
value 0.00829
scoring_system epss
scoring_elements 0.74475
published_at 2026-04-07T12:55:00Z
5
value 0.00829
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-08T12:55:00Z
6
value 0.00829
scoring_system epss
scoring_elements 0.74523
published_at 2026-04-09T12:55:00Z
7
value 0.00829
scoring_system epss
scoring_elements 0.74544
published_at 2026-04-11T12:55:00Z
8
value 0.00829
scoring_system epss
scoring_elements 0.74525
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
reference_id 1079851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
reference_id mfsa2014-45
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
9
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
10
reference_url https://access.redhat.com/errata/RHSA-2014:1073
reference_id RHSA-2014:1073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1073
11
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
12
reference_url https://usn.ubuntu.com/2159-1/
reference_id USN-2159-1
reference_type
scores
url https://usn.ubuntu.com/2159-1/
13
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1492
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ert-2qyc-cfc1
2
url VCID-1ntg-ddgs-tfhw
vulnerability_id VCID-1ntg-ddgs-tfhw
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1520
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11599
published_at 2026-04-13T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11552
published_at 2026-04-01T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11678
published_at 2026-04-02T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11721
published_at 2026-04-04T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11506
published_at 2026-04-07T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11592
published_at 2026-04-08T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11652
published_at 2026-04-09T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11663
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11626
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1520
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520
reference_id CVE-2014-1520
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-35
reference_id mfsa2014-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-35
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1520
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ntg-ddgs-tfhw
3
url VCID-1ytq-j1bc-cbg6
vulnerability_id VCID-1ytq-j1bc-cbg6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1560
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68321
published_at 2026-04-13T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68256
published_at 2026-04-01T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.68366
published_at 2026-04-11T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68353
published_at 2026-04-12T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68276
published_at 2026-04-02T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68296
published_at 2026-04-04T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.68273
published_at 2026-04-07T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-08T12:55:00Z
8
value 0.00562
scoring_system epss
scoring_elements 0.6834
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1560
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=997795
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=997795
3
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
4
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
5
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
6
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
reference_id 1121480
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560
reference_id CVE-2014-1560
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1560
reference_id CVE-2014-1560
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1560
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
reference_id mfsa2014-65
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
23
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
24
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1560
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ytq-j1bc-cbg6
4
url VCID-24qn-29xp-93cr
vulnerability_id VCID-24qn-29xp-93cr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1493
reference_id
reference_type
scores
0
value 0.01468
scoring_system epss
scoring_elements 0.80902
published_at 2026-04-13T12:55:00Z
1
value 0.01468
scoring_system epss
scoring_elements 0.80843
published_at 2026-04-01T12:55:00Z
2
value 0.01468
scoring_system epss
scoring_elements 0.80852
published_at 2026-04-02T12:55:00Z
3
value 0.01468
scoring_system epss
scoring_elements 0.80875
published_at 2026-04-04T12:55:00Z
4
value 0.01468
scoring_system epss
scoring_elements 0.80872
published_at 2026-04-07T12:55:00Z
5
value 0.01468
scoring_system epss
scoring_elements 0.809
published_at 2026-04-08T12:55:00Z
6
value 0.01468
scoring_system epss
scoring_elements 0.80909
published_at 2026-04-09T12:55:00Z
7
value 0.01468
scoring_system epss
scoring_elements 0.80925
published_at 2026-04-11T12:55:00Z
8
value 0.01468
scoring_system epss
scoring_elements 0.80911
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077013
reference_id 1077013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077013
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-15
reference_id mfsa2014-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-15
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1493
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24qn-29xp-93cr
5
url VCID-29gb-hk74-myfk
vulnerability_id VCID-29gb-hk74-myfk
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5604
reference_id
reference_type
scores
0
value 0.06864
scoring_system epss
scoring_elements 0.9137
published_at 2026-04-13T12:55:00Z
1
value 0.06864
scoring_system epss
scoring_elements 0.9132
published_at 2026-04-01T12:55:00Z
2
value 0.06864
scoring_system epss
scoring_elements 0.91325
published_at 2026-04-02T12:55:00Z
3
value 0.06864
scoring_system epss
scoring_elements 0.91335
published_at 2026-04-04T12:55:00Z
4
value 0.06864
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-07T12:55:00Z
5
value 0.06864
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-08T12:55:00Z
6
value 0.06864
scoring_system epss
scoring_elements 0.91361
published_at 2026-04-09T12:55:00Z
7
value 0.06864
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-11T12:55:00Z
8
value 0.06864
scoring_system epss
scoring_elements 0.91371
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023863
reference_id 1023863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023863
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-95
reference_id mfsa2013-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-95
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5604
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29gb-hk74-myfk
6
url VCID-2kyd-fwqg-qufp
vulnerability_id VCID-2kyd-fwqg-qufp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5598
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-13T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73641
published_at 2026-04-01T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.7365
published_at 2026-04-02T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73674
published_at 2026-04-04T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73647
published_at 2026-04-07T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-08T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73695
published_at 2026-04-09T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-11T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73699
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5598
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023842
reference_id 1023842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023842
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598
reference_id CVE-2013-5598
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-99
reference_id mfsa2013-99
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-99
6
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5598
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kyd-fwqg-qufp
7
url VCID-2uha-ku3u-q3ac
vulnerability_id VCID-2uha-ku3u-q3ac
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1525
reference_id
reference_type
scores
0
value 0.01864
scoring_system epss
scoring_elements 0.83059
published_at 2026-04-13T12:55:00Z
1
value 0.01864
scoring_system epss
scoring_elements 0.82994
published_at 2026-04-01T12:55:00Z
2
value 0.01864
scoring_system epss
scoring_elements 0.83011
published_at 2026-04-02T12:55:00Z
3
value 0.01864
scoring_system epss
scoring_elements 0.83024
published_at 2026-04-04T12:55:00Z
4
value 0.01864
scoring_system epss
scoring_elements 0.83022
published_at 2026-04-07T12:55:00Z
5
value 0.01864
scoring_system epss
scoring_elements 0.83047
published_at 2026-04-08T12:55:00Z
6
value 0.01864
scoring_system epss
scoring_elements 0.83054
published_at 2026-04-09T12:55:00Z
7
value 0.01864
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-11T12:55:00Z
8
value 0.01864
scoring_system epss
scoring_elements 0.83064
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1525
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1095070
reference_id 1095070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1095070
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525
reference_id CVE-2014-1525
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-39
reference_id mfsa2014-39
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-39
6
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1525
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uha-ku3u-q3ac
8
url VCID-2yj1-m2c9-syfa
vulnerability_id VCID-2yj1-m2c9-syfa
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5595
reference_id
reference_type
scores
0
value 0.02577
scoring_system epss
scoring_elements 0.8556
published_at 2026-04-13T12:55:00Z
1
value 0.02577
scoring_system epss
scoring_elements 0.85488
published_at 2026-04-01T12:55:00Z
2
value 0.02577
scoring_system epss
scoring_elements 0.85501
published_at 2026-04-02T12:55:00Z
3
value 0.02577
scoring_system epss
scoring_elements 0.85517
published_at 2026-04-04T12:55:00Z
4
value 0.02577
scoring_system epss
scoring_elements 0.85522
published_at 2026-04-07T12:55:00Z
5
value 0.02577
scoring_system epss
scoring_elements 0.85542
published_at 2026-04-08T12:55:00Z
6
value 0.02577
scoring_system epss
scoring_elements 0.85552
published_at 2026-04-09T12:55:00Z
7
value 0.02577
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-11T12:55:00Z
8
value 0.02577
scoring_system epss
scoring_elements 0.85564
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023839
reference_id 1023839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023839
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-96
reference_id mfsa2013-96
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-96
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5595
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yj1-m2c9-syfa
9
url VCID-3cxj-t9e2-q3hj
vulnerability_id VCID-3cxj-t9e2-q3hj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1542
reference_id
reference_type
scores
0
value 0.04721
scoring_system epss
scoring_elements 0.89386
published_at 2026-04-13T12:55:00Z
1
value 0.04721
scoring_system epss
scoring_elements 0.89344
published_at 2026-04-01T12:55:00Z
2
value 0.04721
scoring_system epss
scoring_elements 0.89392
published_at 2026-04-11T12:55:00Z
3
value 0.04721
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-12T12:55:00Z
4
value 0.04721
scoring_system epss
scoring_elements 0.89349
published_at 2026-04-02T12:55:00Z
5
value 0.04721
scoring_system epss
scoring_elements 0.89361
published_at 2026-04-04T12:55:00Z
6
value 0.04721
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-07T12:55:00Z
7
value 0.04721
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-08T12:55:00Z
8
value 0.04721
scoring_system epss
scoring_elements 0.89384
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1542
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=991533
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=991533
5
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
6
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
7
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
8
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
9
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
10
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-53.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-53.html
11
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
12
reference_url http://www.securityfocus.com/bid/67968
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67968
13
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
14
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107425
reference_id 1107425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107425
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542
reference_id CVE-2014-1542
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1542
reference_id CVE-2014-1542
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1542
22
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-53
reference_id mfsa2014-53
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-53
24
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1542
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cxj-t9e2-q3hj
10
url VCID-3hsx-gtzg-duhf
vulnerability_id VCID-3hsx-gtzg-duhf
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0918.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0918.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1556
reference_id
reference_type
scores
0
value 0.009
scoring_system epss
scoring_elements 0.75673
published_at 2026-04-12T12:55:00Z
1
value 0.009
scoring_system epss
scoring_elements 0.7561
published_at 2026-04-01T12:55:00Z
2
value 0.009
scoring_system epss
scoring_elements 0.75667
published_at 2026-04-13T12:55:00Z
3
value 0.009
scoring_system epss
scoring_elements 0.75692
published_at 2026-04-11T12:55:00Z
4
value 0.009
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-02T12:55:00Z
5
value 0.009
scoring_system epss
scoring_elements 0.75642
published_at 2026-04-04T12:55:00Z
6
value 0.009
scoring_system epss
scoring_elements 0.75622
published_at 2026-04-07T12:55:00Z
7
value 0.009
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1556
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1028891
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1028891
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
9
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
10
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
11
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
12
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
13
reference_url http://secunia.com/advisories/60306
reference_id
reference_type
scores
url http://secunia.com/advisories/60306
14
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
15
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
16
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
17
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
18
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
19
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-62.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-62.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
21
reference_url http://www.securityfocus.com/bid/68822
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68822
22
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
23
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121478
reference_id 1121478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121478
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1556
reference_id CVE-2014-1556
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1556
46
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-62
reference_id mfsa2014-62
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-62
48
reference_url https://access.redhat.com/errata/RHSA-2014:0918
reference_id RHSA-2014:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0918
49
reference_url https://access.redhat.com/errata/RHSA-2014:0919
reference_id RHSA-2014:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0919
50
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
51
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1556
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hsx-gtzg-duhf
11
url VCID-3n3r-1ucq-pye4
vulnerability_id VCID-3n3r-1ucq-pye4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1563
reference_id
reference_type
scores
0
value 0.0144
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-13T12:55:00Z
1
value 0.0144
scoring_system epss
scoring_elements 0.80661
published_at 2026-04-01T12:55:00Z
2
value 0.0144
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-11T12:55:00Z
3
value 0.0144
scoring_system epss
scoring_elements 0.80727
published_at 2026-04-12T12:55:00Z
4
value 0.0144
scoring_system epss
scoring_elements 0.8067
published_at 2026-04-02T12:55:00Z
5
value 0.0144
scoring_system epss
scoring_elements 0.80691
published_at 2026-04-04T12:55:00Z
6
value 0.0144
scoring_system epss
scoring_elements 0.80686
published_at 2026-04-07T12:55:00Z
7
value 0.0144
scoring_system epss
scoring_elements 0.80715
published_at 2026-04-08T12:55:00Z
8
value 0.0144
scoring_system epss
scoring_elements 0.80725
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1563
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1018524
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1018524
7
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
8
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-68.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/69523
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69523
12
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
13
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135864
reference_id 1135864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135864
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
reference_id CVE-2014-1563
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1563
reference_id CVE-2014-1563
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1563
25
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-68
reference_id mfsa2014-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-68
27
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
28
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1563
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3n3r-1ucq-pye4
12
url VCID-3vxn-zjpx-4ff5
vulnerability_id VCID-3vxn-zjpx-4ff5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1483
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51139
published_at 2026-04-13T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51044
published_at 2026-04-01T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51098
published_at 2026-04-02T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51122
published_at 2026-04-04T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51079
published_at 2026-04-07T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51135
published_at 2026-04-08T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51132
published_at 2026-04-09T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51176
published_at 2026-04-11T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51154
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1483
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060943
reference_id 1060943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060943
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483
reference_id CVE-2014-1483
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-05
reference_id mfsa2014-05
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-05
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1483
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vxn-zjpx-4ff5
13
url VCID-3vyb-n8e7-k7f7
vulnerability_id VCID-3vyb-n8e7-k7f7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1522
reference_id
reference_type
scores
0
value 0.00762
scoring_system epss
scoring_elements 0.73365
published_at 2026-04-13T12:55:00Z
1
value 0.00762
scoring_system epss
scoring_elements 0.73314
published_at 2026-04-01T12:55:00Z
2
value 0.00762
scoring_system epss
scoring_elements 0.73323
published_at 2026-04-02T12:55:00Z
3
value 0.00762
scoring_system epss
scoring_elements 0.73347
published_at 2026-04-04T12:55:00Z
4
value 0.00762
scoring_system epss
scoring_elements 0.7332
published_at 2026-04-07T12:55:00Z
5
value 0.00762
scoring_system epss
scoring_elements 0.73356
published_at 2026-04-08T12:55:00Z
6
value 0.00762
scoring_system epss
scoring_elements 0.7337
published_at 2026-04-09T12:55:00Z
7
value 0.00762
scoring_system epss
scoring_elements 0.73393
published_at 2026-04-11T12:55:00Z
8
value 0.00762
scoring_system epss
scoring_elements 0.73373
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1522
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1095066
reference_id 1095066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1095066
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522
reference_id CVE-2014-1522
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-36
reference_id mfsa2014-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-36
6
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1522
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vyb-n8e7-k7f7
14
url VCID-45ek-y9nx-j3cd
vulnerability_id VCID-45ek-y9nx-j3cd
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0831
reference_id
reference_type
scores
0
value 0.02019
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-13T12:55:00Z
1
value 0.02019
scoring_system epss
scoring_elements 0.83688
published_at 2026-04-01T12:55:00Z
2
value 0.02019
scoring_system epss
scoring_elements 0.83701
published_at 2026-04-02T12:55:00Z
3
value 0.02019
scoring_system epss
scoring_elements 0.83715
published_at 2026-04-04T12:55:00Z
4
value 0.02019
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-07T12:55:00Z
5
value 0.02019
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-08T12:55:00Z
6
value 0.02019
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-09T12:55:00Z
7
value 0.02019
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-11T12:55:00Z
8
value 0.02019
scoring_system epss
scoring_elements 0.83759
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195619
reference_id 1195619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195619
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-16
reference_id mfsa2015-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-16
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0831
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd
15
url VCID-49hp-8pm6-vkhr
vulnerability_id VCID-49hp-8pm6-vkhr
summary security update
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1545
reference_id
reference_type
scores
0
value 0.02889
scoring_system epss
scoring_elements 0.86314
published_at 2026-04-13T12:55:00Z
1
value 0.02889
scoring_system epss
scoring_elements 0.86249
published_at 2026-04-01T12:55:00Z
2
value 0.02889
scoring_system epss
scoring_elements 0.8632
published_at 2026-04-11T12:55:00Z
3
value 0.02889
scoring_system epss
scoring_elements 0.86318
published_at 2026-04-12T12:55:00Z
4
value 0.02889
scoring_system epss
scoring_elements 0.86258
published_at 2026-04-02T12:55:00Z
5
value 0.02889
scoring_system epss
scoring_elements 0.86276
published_at 2026-04-04T12:55:00Z
6
value 0.02889
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-07T12:55:00Z
7
value 0.02889
scoring_system epss
scoring_elements 0.86296
published_at 2026-04-08T12:55:00Z
8
value 0.02889
scoring_system epss
scoring_elements 0.86306
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1545
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1018783
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1018783
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
13
reference_url http://secunia.com/advisories/58984
reference_id
reference_type
scores
url http://secunia.com/advisories/58984
14
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
15
reference_url http://secunia.com/advisories/59275
reference_id
reference_type
scores
url http://secunia.com/advisories/59275
16
reference_url http://secunia.com/advisories/59318
reference_id
reference_type
scores
url http://secunia.com/advisories/59318
17
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
18
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
19
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
20
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
21
reference_url http://secunia.com/advisories/59614
reference_id
reference_type
scores
url http://secunia.com/advisories/59614
22
reference_url http://www.debian.org/security/2014/dsa-2955
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2955
23
reference_url http://www.debian.org/security/2014/dsa-2960
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2960
24
reference_url http://www.debian.org/security/2014/dsa-2962
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2962
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-55.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-55.html
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
28
reference_url http://www.securityfocus.com/bid/67975
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67975
29
reference_url http://www.securitytracker.com/id/1030404
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030404
30
reference_url http://www.ubuntu.com/usn/USN-2265-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2265-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107432
reference_id 1107432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107432
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1545
reference_id CVE-2014-1545
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1545
78
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
79
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-55
reference_id mfsa2014-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-55
80
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
81
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
82
reference_url https://usn.ubuntu.com/2265-1/
reference_id USN-2265-1
reference_type
scores
url https://usn.ubuntu.com/2265-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1545
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49hp-8pm6-vkhr
16
url VCID-4dvq-ta2c-s7fp
vulnerability_id VCID-4dvq-ta2c-s7fp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0826
reference_id
reference_type
scores
0
value 0.00697
scoring_system epss
scoring_elements 0.71936
published_at 2026-04-13T12:55:00Z
1
value 0.00697
scoring_system epss
scoring_elements 0.71898
published_at 2026-04-01T12:55:00Z
2
value 0.00697
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-02T12:55:00Z
3
value 0.00697
scoring_system epss
scoring_elements 0.71924
published_at 2026-04-04T12:55:00Z
4
value 0.00697
scoring_system epss
scoring_elements 0.71897
published_at 2026-04-07T12:55:00Z
5
value 0.00697
scoring_system epss
scoring_elements 0.71935
published_at 2026-04-08T12:55:00Z
6
value 0.00697
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-09T12:55:00Z
7
value 0.00697
scoring_system epss
scoring_elements 0.71971
published_at 2026-04-11T12:55:00Z
8
value 0.00697
scoring_system epss
scoring_elements 0.71954
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0826
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195629
reference_id 1195629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195629
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826
reference_id CVE-2015-0826
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-20
reference_id mfsa2015-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-20
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0826
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp
17
url VCID-4vhr-24e3-d3d2
vulnerability_id VCID-4vhr-24e3-d3d2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1593
reference_id
reference_type
scores
0
value 0.0211
scoring_system epss
scoring_elements 0.84106
published_at 2026-04-13T12:55:00Z
1
value 0.0211
scoring_system epss
scoring_elements 0.84038
published_at 2026-04-01T12:55:00Z
2
value 0.0211
scoring_system epss
scoring_elements 0.84117
published_at 2026-04-11T12:55:00Z
3
value 0.0211
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-12T12:55:00Z
4
value 0.0211
scoring_system epss
scoring_elements 0.84051
published_at 2026-04-02T12:55:00Z
5
value 0.0211
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-04T12:55:00Z
6
value 0.0211
scoring_system epss
scoring_elements 0.84069
published_at 2026-04-07T12:55:00Z
7
value 0.0211
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-08T12:55:00Z
8
value 0.0211
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1593
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71395
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71395
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169209
reference_id 1169209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169209
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1593
reference_id CVE-2014-1593
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1593
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-88
reference_id mfsa2014-88
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-88
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1593
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2
18
url VCID-4xgr-unyn-jkfj
vulnerability_id VCID-4xgr-unyn-jkfj
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1578
reference_id
reference_type
scores
0
value 0.01644
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-13T12:55:00Z
1
value 0.01644
scoring_system epss
scoring_elements 0.81896
published_at 2026-04-01T12:55:00Z
2
value 0.01644
scoring_system epss
scoring_elements 0.8198
published_at 2026-04-11T12:55:00Z
3
value 0.01644
scoring_system epss
scoring_elements 0.81969
published_at 2026-04-12T12:55:00Z
4
value 0.01644
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-02T12:55:00Z
5
value 0.01644
scoring_system epss
scoring_elements 0.8193
published_at 2026-04-04T12:55:00Z
6
value 0.01644
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-07T12:55:00Z
7
value 0.01644
scoring_system epss
scoring_elements 0.81953
published_at 2026-04-08T12:55:00Z
8
value 0.01644
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1578
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1063327
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1063327
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
22
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
23
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
24
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
25
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
26
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
27
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
28
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
29
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-77.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-77.html
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
31
reference_url http://www.securityfocus.com/bid/70428
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70428
32
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
33
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
34
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
35
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152361
reference_id 1152361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152361
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435
reference_id 765435
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1578
reference_id CVE-2014-1578
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1578
45
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
46
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-77
reference_id mfsa2014-77
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-77
47
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
48
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
49
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
50
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1578
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xgr-unyn-jkfj
19
url VCID-4yww-etfw-cug5
vulnerability_id VCID-4yww-etfw-cug5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1511
reference_id
reference_type
scores
0
value 0.70488
scoring_system epss
scoring_elements 0.9869
published_at 2026-04-13T12:55:00Z
1
value 0.70488
scoring_system epss
scoring_elements 0.98678
published_at 2026-04-01T12:55:00Z
2
value 0.70488
scoring_system epss
scoring_elements 0.98679
published_at 2026-04-02T12:55:00Z
3
value 0.70488
scoring_system epss
scoring_elements 0.98682
published_at 2026-04-04T12:55:00Z
4
value 0.70488
scoring_system epss
scoring_elements 0.98685
published_at 2026-04-07T12:55:00Z
5
value 0.70488
scoring_system epss
scoring_elements 0.98686
published_at 2026-04-08T12:55:00Z
6
value 0.70488
scoring_system epss
scoring_elements 0.98687
published_at 2026-04-09T12:55:00Z
7
value 0.70488
scoring_system epss
scoring_elements 0.98689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077490
reference_id 1077490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077490
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
reference_id mfsa2014-29
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1511
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yww-etfw-cug5
20
url VCID-52kt-axpr-vydx
vulnerability_id VCID-52kt-axpr-vydx
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1523
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-13T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67529
published_at 2026-04-01T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67565
published_at 2026-04-07T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67587
published_at 2026-04-04T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67629
published_at 2026-04-09T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67652
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1523
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092660
reference_id 1092660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092660
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-37
reference_id mfsa2014-37
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-37
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1523
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52kt-axpr-vydx
21
url VCID-5fwj-z7cg-rubb
vulnerability_id VCID-5fwj-z7cg-rubb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1518
reference_id
reference_type
scores
0
value 0.02818
scoring_system epss
scoring_elements 0.8615
published_at 2026-04-13T12:55:00Z
1
value 0.02818
scoring_system epss
scoring_elements 0.86085
published_at 2026-04-01T12:55:00Z
2
value 0.02818
scoring_system epss
scoring_elements 0.86095
published_at 2026-04-02T12:55:00Z
3
value 0.02818
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-07T12:55:00Z
4
value 0.02818
scoring_system epss
scoring_elements 0.8613
published_at 2026-04-08T12:55:00Z
5
value 0.02818
scoring_system epss
scoring_elements 0.86141
published_at 2026-04-09T12:55:00Z
6
value 0.02818
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-11T12:55:00Z
7
value 0.02818
scoring_system epss
scoring_elements 0.86154
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092657
reference_id 1092657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092657
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-34
reference_id mfsa2014-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-34
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1518
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwj-z7cg-rubb
22
url VCID-5vvt-9wk5-qbej
vulnerability_id VCID-5vvt-9wk5-qbej
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1510
reference_id
reference_type
scores
0
value 0.71088
scoring_system epss
scoring_elements 0.98704
published_at 2026-04-07T12:55:00Z
1
value 0.71088
scoring_system epss
scoring_elements 0.98696
published_at 2026-04-02T12:55:00Z
2
value 0.71088
scoring_system epss
scoring_elements 0.987
published_at 2026-04-04T12:55:00Z
3
value 0.71088
scoring_system epss
scoring_elements 0.98708
published_at 2026-04-13T12:55:00Z
4
value 0.71088
scoring_system epss
scoring_elements 0.98705
published_at 2026-04-09T12:55:00Z
5
value 0.71088
scoring_system epss
scoring_elements 0.98707
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1510
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077490
reference_id 1077490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077490
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb
reference_id CVE-2014-1511;OSVDB-104594;CVE-2014-1510;OSVDB-104593
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb
14
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
reference_id mfsa2014-29
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
16
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
17
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
18
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
19
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1510
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vvt-9wk5-qbej
23
url VCID-5wtn-t32h-xyg7
vulnerability_id VCID-5wtn-t32h-xyg7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6672
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76105
published_at 2026-04-13T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-01T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76047
published_at 2026-04-02T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-04T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-07T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-08T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-09T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-11T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76108
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6672
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039427
reference_id 1039427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672
reference_id CVE-2013-6672
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-112
reference_id mfsa2013-112
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-112
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-6672
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtn-t32h-xyg7
24
url VCID-5xfz-9tyc-xfh3
vulnerability_id VCID-5xfz-9tyc-xfh3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1500
reference_id
reference_type
scores
0
value 0.02256
scoring_system epss
scoring_elements 0.84602
published_at 2026-04-13T12:55:00Z
1
value 0.02256
scoring_system epss
scoring_elements 0.84525
published_at 2026-04-01T12:55:00Z
2
value 0.02256
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-02T12:55:00Z
3
value 0.02256
scoring_system epss
scoring_elements 0.8456
published_at 2026-04-04T12:55:00Z
4
value 0.02256
scoring_system epss
scoring_elements 0.84564
published_at 2026-04-07T12:55:00Z
5
value 0.02256
scoring_system epss
scoring_elements 0.84586
published_at 2026-04-08T12:55:00Z
6
value 0.02256
scoring_system epss
scoring_elements 0.84592
published_at 2026-04-09T12:55:00Z
7
value 0.02256
scoring_system epss
scoring_elements 0.84611
published_at 2026-04-11T12:55:00Z
8
value 0.02256
scoring_system epss
scoring_elements 0.84606
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1500
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077020
reference_id 1077020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077020
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500
reference_id CVE-2014-1500
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-20
reference_id mfsa2014-20
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-20
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1500
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xfz-9tyc-xfh3
25
url VCID-5z4v-hqea-eucx
vulnerability_id VCID-5z4v-hqea-eucx
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0821
reference_id
reference_type
scores
0
value 0.01339
scoring_system epss
scoring_elements 0.80006
published_at 2026-04-13T12:55:00Z
1
value 0.01339
scoring_system epss
scoring_elements 0.79955
published_at 2026-04-01T12:55:00Z
2
value 0.01339
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-02T12:55:00Z
3
value 0.01339
scoring_system epss
scoring_elements 0.79984
published_at 2026-04-04T12:55:00Z
4
value 0.01339
scoring_system epss
scoring_elements 0.79973
published_at 2026-04-07T12:55:00Z
5
value 0.01339
scoring_system epss
scoring_elements 0.80001
published_at 2026-04-08T12:55:00Z
6
value 0.01339
scoring_system epss
scoring_elements 0.8001
published_at 2026-04-09T12:55:00Z
7
value 0.01339
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-11T12:55:00Z
8
value 0.01339
scoring_system epss
scoring_elements 0.80014
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0821
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195639
reference_id 1195639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195639
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821
reference_id CVE-2015-0821
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-25
reference_id mfsa2015-25
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-25
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0821
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx
26
url VCID-62px-695g-57bk
vulnerability_id VCID-62px-695g-57bk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
reference_id
reference_type
scores
0
value 0.11056
scoring_system epss
scoring_elements 0.93445
published_at 2026-04-13T12:55:00Z
1
value 0.11056
scoring_system epss
scoring_elements 0.93411
published_at 2026-04-01T12:55:00Z
2
value 0.11056
scoring_system epss
scoring_elements 0.93418
published_at 2026-04-02T12:55:00Z
3
value 0.11056
scoring_system epss
scoring_elements 0.93426
published_at 2026-04-04T12:55:00Z
4
value 0.11056
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-07T12:55:00Z
5
value 0.11056
scoring_system epss
scoring_elements 0.93435
published_at 2026-04-08T12:55:00Z
6
value 0.11056
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-09T12:55:00Z
7
value 0.11056
scoring_system epss
scoring_elements 0.93444
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
reference_id 1039429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
reference_id CVE-2013-5613
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
reference_id mfsa2013-114
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5613
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk
27
url VCID-63hm-xmht-g3cp
vulnerability_id VCID-63hm-xmht-g3cp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1592
reference_id
reference_type
scores
0
value 0.01768
scoring_system epss
scoring_elements 0.82637
published_at 2026-04-13T12:55:00Z
1
value 0.01768
scoring_system epss
scoring_elements 0.82569
published_at 2026-04-01T12:55:00Z
2
value 0.01768
scoring_system epss
scoring_elements 0.82647
published_at 2026-04-11T12:55:00Z
3
value 0.01768
scoring_system epss
scoring_elements 0.82642
published_at 2026-04-12T12:55:00Z
4
value 0.01768
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-02T12:55:00Z
5
value 0.01768
scoring_system epss
scoring_elements 0.82599
published_at 2026-04-04T12:55:00Z
6
value 0.01768
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-07T12:55:00Z
7
value 0.01768
scoring_system epss
scoring_elements 0.82621
published_at 2026-04-08T12:55:00Z
8
value 0.01768
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1592
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71398
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71398
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169208
reference_id 1169208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169208
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1592
reference_id CVE-2014-1592
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1592
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-87
reference_id mfsa2014-87
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-87
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1592
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp
28
url VCID-664r-gx3z-d7c6
vulnerability_id VCID-664r-gx3z-d7c6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0823
reference_id
reference_type
scores
0
value 0.01709
scoring_system epss
scoring_elements 0.82331
published_at 2026-04-13T12:55:00Z
1
value 0.01709
scoring_system epss
scoring_elements 0.82261
published_at 2026-04-01T12:55:00Z
2
value 0.01709
scoring_system epss
scoring_elements 0.82274
published_at 2026-04-02T12:55:00Z
3
value 0.01709
scoring_system epss
scoring_elements 0.82294
published_at 2026-04-04T12:55:00Z
4
value 0.01709
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-07T12:55:00Z
5
value 0.01709
scoring_system epss
scoring_elements 0.82315
published_at 2026-04-08T12:55:00Z
6
value 0.01709
scoring_system epss
scoring_elements 0.82322
published_at 2026-04-09T12:55:00Z
7
value 0.01709
scoring_system epss
scoring_elements 0.82342
published_at 2026-04-11T12:55:00Z
8
value 0.01709
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0823
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195636
reference_id 1195636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195636
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823
reference_id CVE-2015-0823
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-23
reference_id mfsa2015-23
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-23
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0823
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-664r-gx3z-d7c6
29
url VCID-69g6-8d1a-kubz
vulnerability_id VCID-69g6-8d1a-kubz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
reference_id
reference_type
scores
0
value 0.10399
scoring_system epss
scoring_elements 0.93214
published_at 2026-04-13T12:55:00Z
1
value 0.10399
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-01T12:55:00Z
2
value 0.10399
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-02T12:55:00Z
3
value 0.10399
scoring_system epss
scoring_elements 0.932
published_at 2026-04-04T12:55:00Z
4
value 0.10399
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-07T12:55:00Z
5
value 0.10399
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-08T12:55:00Z
6
value 0.10399
scoring_system epss
scoring_elements 0.9321
published_at 2026-04-09T12:55:00Z
7
value 0.10399
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-11T12:55:00Z
8
value 0.10399
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
reference_id 1039426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
reference_id CVE-2013-6671
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
reference_id mfsa2013-111
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-6671
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz
30
url VCID-6gmw-bq5a-6qgg
vulnerability_id VCID-6gmw-bq5a-6qgg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1588
reference_id
reference_type
scores
0
value 0.01676
scoring_system epss
scoring_elements 0.82154
published_at 2026-04-13T12:55:00Z
1
value 0.01676
scoring_system epss
scoring_elements 0.82086
published_at 2026-04-01T12:55:00Z
2
value 0.01676
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-11T12:55:00Z
3
value 0.01676
scoring_system epss
scoring_elements 0.82159
published_at 2026-04-12T12:55:00Z
4
value 0.01676
scoring_system epss
scoring_elements 0.82098
published_at 2026-04-02T12:55:00Z
5
value 0.01676
scoring_system epss
scoring_elements 0.82119
published_at 2026-04-04T12:55:00Z
6
value 0.01676
scoring_system epss
scoring_elements 0.82115
published_at 2026-04-07T12:55:00Z
7
value 0.01676
scoring_system epss
scoring_elements 0.82141
published_at 2026-04-08T12:55:00Z
8
value 0.01676
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1588
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169204
reference_id 1169204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169204
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588
reference_id CVE-2014-1588
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1588
reference_id CVE-2014-1588
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1588
20
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
reference_id mfsa2014-83
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
22
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1588
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gmw-bq5a-6qgg
31
url VCID-6hk9-8e47-zbhw
vulnerability_id VCID-6hk9-8e47-zbhw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1513
reference_id
reference_type
scores
0
value 0.01605
scoring_system epss
scoring_elements 0.81728
published_at 2026-04-13T12:55:00Z
1
value 0.01605
scoring_system epss
scoring_elements 0.81664
published_at 2026-04-01T12:55:00Z
2
value 0.01605
scoring_system epss
scoring_elements 0.81675
published_at 2026-04-02T12:55:00Z
3
value 0.01605
scoring_system epss
scoring_elements 0.81698
published_at 2026-04-04T12:55:00Z
4
value 0.01605
scoring_system epss
scoring_elements 0.81695
published_at 2026-04-07T12:55:00Z
5
value 0.01605
scoring_system epss
scoring_elements 0.81722
published_at 2026-04-08T12:55:00Z
6
value 0.01605
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-09T12:55:00Z
7
value 0.01605
scoring_system epss
scoring_elements 0.81746
published_at 2026-04-11T12:55:00Z
8
value 0.01605
scoring_system epss
scoring_elements 0.81734
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077492
reference_id 1077492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077492
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-31
reference_id mfsa2014-31
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-31
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1513
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hk9-8e47-zbhw
32
url VCID-6rfs-5xxg-r3d3
vulnerability_id VCID-6rfs-5xxg-r3d3
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0741.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0741.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0742.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0742.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-0741.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0741.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-0742.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0742.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1541
reference_id
reference_type
scores
0
value 0.01963
scoring_system epss
scoring_elements 0.83514
published_at 2026-04-13T12:55:00Z
1
value 0.01963
scoring_system epss
scoring_elements 0.83449
published_at 2026-04-01T12:55:00Z
2
value 0.01963
scoring_system epss
scoring_elements 0.83523
published_at 2026-04-11T12:55:00Z
3
value 0.01963
scoring_system epss
scoring_elements 0.83517
published_at 2026-04-12T12:55:00Z
4
value 0.01963
scoring_system epss
scoring_elements 0.83462
published_at 2026-04-02T12:55:00Z
5
value 0.01963
scoring_system epss
scoring_elements 0.83477
published_at 2026-04-04T12:55:00Z
6
value 0.01963
scoring_system epss
scoring_elements 0.83475
published_at 2026-04-07T12:55:00Z
7
value 0.01963
scoring_system epss
scoring_elements 0.83499
published_at 2026-04-08T12:55:00Z
8
value 0.01963
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1541
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1000185
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1000185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
16
reference_url http://secunia.com/advisories/58984
reference_id
reference_type
scores
url http://secunia.com/advisories/58984
17
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
18
reference_url http://secunia.com/advisories/59149
reference_id
reference_type
scores
url http://secunia.com/advisories/59149
19
reference_url http://secunia.com/advisories/59150
reference_id
reference_type
scores
url http://secunia.com/advisories/59150
20
reference_url http://secunia.com/advisories/59165
reference_id
reference_type
scores
url http://secunia.com/advisories/59165
21
reference_url http://secunia.com/advisories/59169
reference_id
reference_type
scores
url http://secunia.com/advisories/59169
22
reference_url http://secunia.com/advisories/59170
reference_id
reference_type
scores
url http://secunia.com/advisories/59170
23
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
24
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
25
reference_url http://secunia.com/advisories/59275
reference_id
reference_type
scores
url http://secunia.com/advisories/59275
26
reference_url http://secunia.com/advisories/59328
reference_id
reference_type
scores
url http://secunia.com/advisories/59328
27
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
28
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
29
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
30
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
31
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
32
reference_url http://www.debian.org/security/2014/dsa-2955
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2955
33
reference_url http://www.debian.org/security/2014/dsa-2960
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2960
34
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-52.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-52.html
35
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
36
reference_url http://www.securityfocus.com/bid/67979
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67979
37
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
38
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
39
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
40
reference_url http://www.ubuntu.com/usn/USN-2250-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2250-1
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107424
reference_id 1107424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107424
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1541
reference_id CVE-2014-1541
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1541
61
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-52
reference_id mfsa2014-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-52
63
reference_url https://access.redhat.com/errata/RHSA-2014:0741
reference_id RHSA-2014:0741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0741
64
reference_url https://access.redhat.com/errata/RHSA-2014:0742
reference_id RHSA-2014:0742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0742
65
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
66
reference_url https://usn.ubuntu.com/2250-1/
reference_id USN-2250-1
reference_type
scores
url https://usn.ubuntu.com/2250-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1541
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rfs-5xxg-r3d3
33
url VCID-6t5b-ykw1-rqdt
vulnerability_id VCID-6t5b-ykw1-rqdt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1480
reference_id
reference_type
scores
0
value 0.0052
scoring_system epss
scoring_elements 0.66818
published_at 2026-04-13T12:55:00Z
1
value 0.0052
scoring_system epss
scoring_elements 0.66744
published_at 2026-04-01T12:55:00Z
2
value 0.0052
scoring_system epss
scoring_elements 0.66783
published_at 2026-04-02T12:55:00Z
3
value 0.0052
scoring_system epss
scoring_elements 0.66808
published_at 2026-04-04T12:55:00Z
4
value 0.0052
scoring_system epss
scoring_elements 0.66781
published_at 2026-04-07T12:55:00Z
5
value 0.0052
scoring_system epss
scoring_elements 0.6683
published_at 2026-04-08T12:55:00Z
6
value 0.0052
scoring_system epss
scoring_elements 0.66844
published_at 2026-04-09T12:55:00Z
7
value 0.0052
scoring_system epss
scoring_elements 0.66864
published_at 2026-04-11T12:55:00Z
8
value 0.0052
scoring_system epss
scoring_elements 0.6685
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1480
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060941
reference_id 1060941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480
reference_id CVE-2014-1480
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-03
reference_id mfsa2014-03
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-03
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1480
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5b-ykw1-rqdt
34
url VCID-6ucm-3m3f-kfgs
vulnerability_id VCID-6ucm-3m3f-kfgs
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1531
reference_id
reference_type
scores
0
value 0.05086
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-13T12:55:00Z
1
value 0.05086
scoring_system epss
scoring_elements 0.89767
published_at 2026-04-01T12:55:00Z
2
value 0.05086
scoring_system epss
scoring_elements 0.8977
published_at 2026-04-02T12:55:00Z
3
value 0.05086
scoring_system epss
scoring_elements 0.89785
published_at 2026-04-04T12:55:00Z
4
value 0.05086
scoring_system epss
scoring_elements 0.89788
published_at 2026-04-07T12:55:00Z
5
value 0.05086
scoring_system epss
scoring_elements 0.89805
published_at 2026-04-08T12:55:00Z
6
value 0.05086
scoring_system epss
scoring_elements 0.89811
published_at 2026-04-09T12:55:00Z
7
value 0.05086
scoring_system epss
scoring_elements 0.89818
published_at 2026-04-11T12:55:00Z
8
value 0.05086
scoring_system epss
scoring_elements 0.89816
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092668
reference_id 1092668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092668
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-44
reference_id mfsa2014-44
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-44
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1531
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ucm-3m3f-kfgs
35
url VCID-7hub-7qnq-63es
vulnerability_id VCID-7hub-7qnq-63es
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1554
reference_id
reference_type
scores
0
value 0.01266
scoring_system epss
scoring_elements 0.79459
published_at 2026-04-13T12:55:00Z
1
value 0.01266
scoring_system epss
scoring_elements 0.79411
published_at 2026-04-01T12:55:00Z
2
value 0.01266
scoring_system epss
scoring_elements 0.79486
published_at 2026-04-11T12:55:00Z
3
value 0.01266
scoring_system epss
scoring_elements 0.79469
published_at 2026-04-12T12:55:00Z
4
value 0.01266
scoring_system epss
scoring_elements 0.79418
published_at 2026-04-02T12:55:00Z
5
value 0.01266
scoring_system epss
scoring_elements 0.79441
published_at 2026-04-04T12:55:00Z
6
value 0.01266
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-07T12:55:00Z
7
value 0.01266
scoring_system epss
scoring_elements 0.79456
published_at 2026-04-08T12:55:00Z
8
value 0.01266
scoring_system epss
scoring_elements 0.79464
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1554
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1004480
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1004480
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1016519
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1016519
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=990247
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=990247
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995704
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995704
9
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
10
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
11
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.securityfocus.com/bid/69526
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69526
14
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
15
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135863
reference_id 1135863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135863
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554
reference_id CVE-2014-1554
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1554
reference_id CVE-2014-1554
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1554
22
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
reference_id mfsa2014-67
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
24
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1554
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hub-7qnq-63es
36
url VCID-7q2x-fv9r-ckdb
vulnerability_id VCID-7q2x-fv9r-ckdb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1526
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71954
published_at 2026-04-01T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71962
published_at 2026-04-02T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71981
published_at 2026-04-04T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71958
published_at 2026-04-07T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71996
published_at 2026-04-08T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72008
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72032
published_at 2026-04-11T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72016
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1526
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1095074
reference_id 1095074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1095074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526
reference_id CVE-2014-1526
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-47
reference_id mfsa2014-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-47
6
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1526
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7q2x-fv9r-ckdb
37
url VCID-7sgt-5xdn-tkey
vulnerability_id VCID-7sgt-5xdn-tkey
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1537
reference_id
reference_type
scores
0
value 0.03334
scoring_system epss
scoring_elements 0.87292
published_at 2026-04-13T12:55:00Z
1
value 0.03334
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-01T12:55:00Z
2
value 0.03334
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-11T12:55:00Z
3
value 0.03334
scoring_system epss
scoring_elements 0.87296
published_at 2026-04-12T12:55:00Z
4
value 0.03334
scoring_system epss
scoring_elements 0.87248
published_at 2026-04-02T12:55:00Z
5
value 0.03334
scoring_system epss
scoring_elements 0.87264
published_at 2026-04-04T12:55:00Z
6
value 0.03334
scoring_system epss
scoring_elements 0.87261
published_at 2026-04-07T12:55:00Z
7
value 0.03334
scoring_system epss
scoring_elements 0.87281
published_at 2026-04-08T12:55:00Z
8
value 0.03334
scoring_system epss
scoring_elements 0.87289
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1537
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=999274
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=999274
8
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
9
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
10
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
11
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
12
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
13
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
14
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
15
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
16
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
17
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
18
reference_url http://www.securityfocus.com/bid/67971
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67971
19
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
20
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
21
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107419
reference_id 1107419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107419
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537
reference_id CVE-2014-1537
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1537
reference_id CVE-2014-1537
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1537
26
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
reference_id mfsa2014-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
28
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1537
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sgt-5xdn-tkey
38
url VCID-81hn-3y96-77db
vulnerability_id VCID-81hn-3y96-77db
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1508
reference_id
reference_type
scores
0
value 0.00986
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-13T12:55:00Z
1
value 0.00986
scoring_system epss
scoring_elements 0.7677
published_at 2026-04-01T12:55:00Z
2
value 0.00986
scoring_system epss
scoring_elements 0.76774
published_at 2026-04-02T12:55:00Z
3
value 0.00986
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-04T12:55:00Z
4
value 0.00986
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-07T12:55:00Z
5
value 0.00986
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-08T12:55:00Z
6
value 0.00986
scoring_system epss
scoring_elements 0.76825
published_at 2026-04-09T12:55:00Z
7
value 0.00986
scoring_system epss
scoring_elements 0.76853
published_at 2026-04-11T12:55:00Z
8
value 0.00986
scoring_system epss
scoring_elements 0.76834
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077025
reference_id 1077025
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077025
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-26
reference_id mfsa2014-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-26
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1508
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81hn-3y96-77db
39
url VCID-8j3v-g9xv-gud5
vulnerability_id VCID-8j3v-g9xv-gud5
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
reference_id
reference_type
scores
0
value 0.02604
scoring_system epss
scoring_elements 0.85622
published_at 2026-04-13T12:55:00Z
1
value 0.02604
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-01T12:55:00Z
2
value 0.02604
scoring_system epss
scoring_elements 0.85563
published_at 2026-04-02T12:55:00Z
3
value 0.02604
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-04T12:55:00Z
4
value 0.02604
scoring_system epss
scoring_elements 0.85585
published_at 2026-04-07T12:55:00Z
5
value 0.02604
scoring_system epss
scoring_elements 0.85605
published_at 2026-04-08T12:55:00Z
6
value 0.02604
scoring_system epss
scoring_elements 0.85616
published_at 2026-04-09T12:55:00Z
7
value 0.02604
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-11T12:55:00Z
8
value 0.02604
scoring_system epss
scoring_elements 0.85626
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
reference_id 1031458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
14
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
15
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-1741
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8j3v-g9xv-gud5
40
url VCID-8s1b-yh8y-cbdk
vulnerability_id VCID-8s1b-yh8y-cbdk
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1587
reference_id
reference_type
scores
0
value 0.01643
scoring_system epss
scoring_elements 0.81958
published_at 2026-04-13T12:55:00Z
1
value 0.01643
scoring_system epss
scoring_elements 0.8189
published_at 2026-04-01T12:55:00Z
2
value 0.01643
scoring_system epss
scoring_elements 0.81974
published_at 2026-04-11T12:55:00Z
3
value 0.01643
scoring_system epss
scoring_elements 0.81963
published_at 2026-04-12T12:55:00Z
4
value 0.01643
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-02T12:55:00Z
5
value 0.01643
scoring_system epss
scoring_elements 0.81924
published_at 2026-04-04T12:55:00Z
6
value 0.01643
scoring_system epss
scoring_elements 0.8192
published_at 2026-04-07T12:55:00Z
7
value 0.01643
scoring_system epss
scoring_elements 0.81947
published_at 2026-04-08T12:55:00Z
8
value 0.01643
scoring_system epss
scoring_elements 0.81954
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1587
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
15
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
16
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
17
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
18
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
19
reference_url http://www.securityfocus.com/bid/71391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71391
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169201
reference_id 1169201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169201
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1587
reference_id CVE-2014-1587
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1587
25
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
reference_id mfsa2014-83
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
27
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
28
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
29
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
30
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1587
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk
41
url VCID-97rg-h7t5-1fhs
vulnerability_id VCID-97rg-h7t5-1fhs
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5607
reference_id
reference_type
scores
0
value 0.01591
scoring_system epss
scoring_elements 0.81653
published_at 2026-04-13T12:55:00Z
1
value 0.01591
scoring_system epss
scoring_elements 0.8159
published_at 2026-04-01T12:55:00Z
2
value 0.01591
scoring_system epss
scoring_elements 0.81601
published_at 2026-04-02T12:55:00Z
3
value 0.01591
scoring_system epss
scoring_elements 0.81622
published_at 2026-04-04T12:55:00Z
4
value 0.01591
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-07T12:55:00Z
5
value 0.01591
scoring_system epss
scoring_elements 0.81647
published_at 2026-04-08T12:55:00Z
6
value 0.01591
scoring_system epss
scoring_elements 0.81652
published_at 2026-04-09T12:55:00Z
7
value 0.01591
scoring_system epss
scoring_elements 0.81673
published_at 2026-04-11T12:55:00Z
8
value 0.01591
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031461
reference_id 1031461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031461
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
10
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
11
reference_url https://usn.ubuntu.com/2087-1/
reference_id USN-2087-1
reference_type
scores
url https://usn.ubuntu.com/2087-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5607
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97rg-h7t5-1fhs
42
url VCID-9bat-kqxd-gkg2
vulnerability_id VCID-9bat-kqxd-gkg2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8634
reference_id
reference_type
scores
0
value 0.01748
scoring_system epss
scoring_elements 0.82545
published_at 2026-04-13T12:55:00Z
1
value 0.01748
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-01T12:55:00Z
2
value 0.01748
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-02T12:55:00Z
3
value 0.01748
scoring_system epss
scoring_elements 0.82506
published_at 2026-04-04T12:55:00Z
4
value 0.01748
scoring_system epss
scoring_elements 0.82502
published_at 2026-04-07T12:55:00Z
5
value 0.01748
scoring_system epss
scoring_elements 0.82529
published_at 2026-04-08T12:55:00Z
6
value 0.01748
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-09T12:55:00Z
7
value 0.01748
scoring_system epss
scoring_elements 0.82555
published_at 2026-04-11T12:55:00Z
8
value 0.01748
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8634
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180962
reference_id 1180962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180962
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
reference_id mfsa2015-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://access.redhat.com/errata/RHSA-2015:0047
reference_id RHSA-2015:0047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0047
11
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
12
reference_url https://usn.ubuntu.com/2460-1/
reference_id USN-2460-1
reference_type
scores
url https://usn.ubuntu.com/2460-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8634
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2
43
url VCID-9e6r-hnyd-6ufr
vulnerability_id VCID-9e6r-hnyd-6ufr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0834
reference_id
reference_type
scores
0
value 0.00514
scoring_system epss
scoring_elements 0.66573
published_at 2026-04-13T12:55:00Z
1
value 0.00514
scoring_system epss
scoring_elements 0.66501
published_at 2026-04-01T12:55:00Z
2
value 0.00514
scoring_system epss
scoring_elements 0.6654
published_at 2026-04-02T12:55:00Z
3
value 0.00514
scoring_system epss
scoring_elements 0.66566
published_at 2026-04-04T12:55:00Z
4
value 0.00514
scoring_system epss
scoring_elements 0.66538
published_at 2026-04-07T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66586
published_at 2026-04-08T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66599
published_at 2026-04-09T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66618
published_at 2026-04-11T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66606
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0834
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195616
reference_id 1195616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195616
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834
reference_id CVE-2015-0834
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-15
reference_id mfsa2015-15
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-15
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0834
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr
44
url VCID-9kcz-e3yx-ckgf
vulnerability_id VCID-9kcz-e3yx-ckgf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1540
reference_id
reference_type
scores
0
value 0.01009
scoring_system epss
scoring_elements 0.77085
published_at 2026-04-13T12:55:00Z
1
value 0.01009
scoring_system epss
scoring_elements 0.77024
published_at 2026-04-01T12:55:00Z
2
value 0.01009
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-11T12:55:00Z
3
value 0.01009
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-12T12:55:00Z
4
value 0.01009
scoring_system epss
scoring_elements 0.77029
published_at 2026-04-02T12:55:00Z
5
value 0.01009
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-04T12:55:00Z
6
value 0.01009
scoring_system epss
scoring_elements 0.77039
published_at 2026-04-07T12:55:00Z
7
value 0.01009
scoring_system epss
scoring_elements 0.77071
published_at 2026-04-08T12:55:00Z
8
value 0.01009
scoring_system epss
scoring_elements 0.77081
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1540
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=978862
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=978862
5
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
6
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
7
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
8
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
9
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
10
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-51.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-51.html
11
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
12
reference_url http://www.securityfocus.com/bid/67978
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67978
13
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
14
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107423
reference_id 1107423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107423
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540
reference_id CVE-2014-1540
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1540
reference_id CVE-2014-1540
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1540
19
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-51
reference_id mfsa2014-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-51
21
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1540
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9kcz-e3yx-ckgf
45
url VCID-adnk-um4v-q7dm
vulnerability_id VCID-adnk-um4v-q7dm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1529
reference_id
reference_type
scores
0
value 0.01321
scoring_system epss
scoring_elements 0.79874
published_at 2026-04-13T12:55:00Z
1
value 0.01321
scoring_system epss
scoring_elements 0.79825
published_at 2026-04-01T12:55:00Z
2
value 0.01321
scoring_system epss
scoring_elements 0.79833
published_at 2026-04-02T12:55:00Z
3
value 0.01321
scoring_system epss
scoring_elements 0.79854
published_at 2026-04-04T12:55:00Z
4
value 0.01321
scoring_system epss
scoring_elements 0.79842
published_at 2026-04-07T12:55:00Z
5
value 0.01321
scoring_system epss
scoring_elements 0.7987
published_at 2026-04-08T12:55:00Z
6
value 0.01321
scoring_system epss
scoring_elements 0.79878
published_at 2026-04-09T12:55:00Z
7
value 0.01321
scoring_system epss
scoring_elements 0.79899
published_at 2026-04-11T12:55:00Z
8
value 0.01321
scoring_system epss
scoring_elements 0.79882
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092664
reference_id 1092664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092664
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-42
reference_id mfsa2014-42
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-42
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1529
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-adnk-um4v-q7dm
46
url VCID-apyq-fcne-wqfw
vulnerability_id VCID-apyq-fcne-wqfw
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1551
reference_id
reference_type
scores
0
value 0.05409
scoring_system epss
scoring_elements 0.9014
published_at 2026-04-13T12:55:00Z
1
value 0.05409
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-01T12:55:00Z
2
value 0.05409
scoring_system epss
scoring_elements 0.90146
published_at 2026-04-11T12:55:00Z
3
value 0.05409
scoring_system epss
scoring_elements 0.90145
published_at 2026-04-12T12:55:00Z
4
value 0.05409
scoring_system epss
scoring_elements 0.90099
published_at 2026-04-02T12:55:00Z
5
value 0.05409
scoring_system epss
scoring_elements 0.90111
published_at 2026-04-04T12:55:00Z
6
value 0.05409
scoring_system epss
scoring_elements 0.90116
published_at 2026-04-07T12:55:00Z
7
value 0.05409
scoring_system epss
scoring_elements 0.90131
published_at 2026-04-08T12:55:00Z
8
value 0.05409
scoring_system epss
scoring_elements 0.90137
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1551
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1018234
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1018234
2
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-59.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-59.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
6
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551
reference_id CVE-2014-1551
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1551
reference_id CVE-2014-1551
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1551
30
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-59
reference_id mfsa2014-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-59
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1551
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apyq-fcne-wqfw
47
url VCID-at2x-qdn8-4bgy
vulnerability_id VCID-at2x-qdn8-4bgy
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1552
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42141
published_at 2026-04-13T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42093
published_at 2026-04-01T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42204
published_at 2026-04-11T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42167
published_at 2026-04-12T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42153
published_at 2026-04-02T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.4218
published_at 2026-04-04T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.4212
published_at 2026-04-07T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4217
published_at 2026-04-08T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42182
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1552
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=985135
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=985135
3
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
4
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
5
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-66.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-66.html
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
7
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
8
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121481
reference_id 1121481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121481
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552
reference_id CVE-2014-1552
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1552
reference_id CVE-2014-1552
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1552
23
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-66
reference_id mfsa2014-66
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-66
25
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
26
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1552
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-at2x-qdn8-4bgy
48
url VCID-b2k8-kjmq-1kh4
vulnerability_id VCID-b2k8-kjmq-1kh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
reference_id
reference_type
scores
0
value 0.10378
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-13T12:55:00Z
1
value 0.10378
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-01T12:55:00Z
2
value 0.10378
scoring_system epss
scoring_elements 0.93189
published_at 2026-04-02T12:55:00Z
3
value 0.10378
scoring_system epss
scoring_elements 0.93193
published_at 2026-04-04T12:55:00Z
4
value 0.10378
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-07T12:55:00Z
5
value 0.10378
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-08T12:55:00Z
6
value 0.10378
scoring_system epss
scoring_elements 0.93204
published_at 2026-04-09T12:55:00Z
7
value 0.10378
scoring_system epss
scoring_elements 0.93208
published_at 2026-04-11T12:55:00Z
8
value 0.10378
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
reference_id 1039423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
reference_id CVE-2013-5618
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
reference_id mfsa2013-109
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5618
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4
49
url VCID-b3mt-3nfn-suc1
vulnerability_id VCID-b3mt-3nfn-suc1
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
reference_id
reference_type
scores
0
value 0.01567
scoring_system epss
scoring_elements 0.81519
published_at 2026-04-12T12:55:00Z
1
value 0.01567
scoring_system epss
scoring_elements 0.81448
published_at 2026-04-01T12:55:00Z
2
value 0.01567
scoring_system epss
scoring_elements 0.81459
published_at 2026-04-02T12:55:00Z
3
value 0.01567
scoring_system epss
scoring_elements 0.81481
published_at 2026-04-04T12:55:00Z
4
value 0.01567
scoring_system epss
scoring_elements 0.81479
published_at 2026-04-07T12:55:00Z
5
value 0.01567
scoring_system epss
scoring_elements 0.81506
published_at 2026-04-08T12:55:00Z
6
value 0.01567
scoring_system epss
scoring_elements 0.81512
published_at 2026-04-13T12:55:00Z
7
value 0.01567
scoring_system epss
scoring_elements 0.81532
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
reference_id 1060953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
13
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
14
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1490
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mt-3nfn-suc1
50
url VCID-b3n2-ujct-nbcy
vulnerability_id VCID-b3n2-ujct-nbcy
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8642
reference_id
reference_type
scores
0
value 0.00659
scoring_system epss
scoring_elements 0.71065
published_at 2026-04-13T12:55:00Z
1
value 0.00659
scoring_system epss
scoring_elements 0.71015
published_at 2026-04-01T12:55:00Z
2
value 0.00659
scoring_system epss
scoring_elements 0.71025
published_at 2026-04-02T12:55:00Z
3
value 0.00659
scoring_system epss
scoring_elements 0.71043
published_at 2026-04-04T12:55:00Z
4
value 0.00659
scoring_system epss
scoring_elements 0.71017
published_at 2026-04-07T12:55:00Z
5
value 0.00659
scoring_system epss
scoring_elements 0.7106
published_at 2026-04-08T12:55:00Z
6
value 0.00659
scoring_system epss
scoring_elements 0.71074
published_at 2026-04-09T12:55:00Z
7
value 0.00659
scoring_system epss
scoring_elements 0.71098
published_at 2026-04-11T12:55:00Z
8
value 0.00659
scoring_system epss
scoring_elements 0.71082
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8642
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180974
reference_id 1180974
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180974
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642
reference_id CVE-2014-8642
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-08
reference_id mfsa2015-08
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-08
6
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8642
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3n2-ujct-nbcy
51
url VCID-ba82-rgap-z7ck
vulnerability_id VCID-ba82-rgap-z7ck
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0824
reference_id
reference_type
scores
0
value 0.01589
scoring_system epss
scoring_elements 0.81632
published_at 2026-04-12T12:55:00Z
1
value 0.01589
scoring_system epss
scoring_elements 0.81562
published_at 2026-04-01T12:55:00Z
2
value 0.01589
scoring_system epss
scoring_elements 0.81573
published_at 2026-04-02T12:55:00Z
3
value 0.01589
scoring_system epss
scoring_elements 0.81594
published_at 2026-04-04T12:55:00Z
4
value 0.01589
scoring_system epss
scoring_elements 0.81592
published_at 2026-04-07T12:55:00Z
5
value 0.01589
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-08T12:55:00Z
6
value 0.01589
scoring_system epss
scoring_elements 0.81625
published_at 2026-04-13T12:55:00Z
7
value 0.01589
scoring_system epss
scoring_elements 0.81645
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0824
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195633
reference_id 1195633
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195633
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824
reference_id CVE-2015-0824
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-22
reference_id mfsa2015-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-22
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0824
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck
52
url VCID-bqyr-zs78-13en
vulnerability_id VCID-bqyr-zs78-13en
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1543
reference_id
reference_type
scores
0
value 0.03404
scoring_system epss
scoring_elements 0.87425
published_at 2026-04-13T12:55:00Z
1
value 0.03404
scoring_system epss
scoring_elements 0.87371
published_at 2026-04-01T12:55:00Z
2
value 0.03404
scoring_system epss
scoring_elements 0.87433
published_at 2026-04-11T12:55:00Z
3
value 0.03404
scoring_system epss
scoring_elements 0.87429
published_at 2026-04-12T12:55:00Z
4
value 0.03404
scoring_system epss
scoring_elements 0.8738
published_at 2026-04-02T12:55:00Z
5
value 0.03404
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-04T12:55:00Z
6
value 0.03404
scoring_system epss
scoring_elements 0.87395
published_at 2026-04-07T12:55:00Z
7
value 0.03404
scoring_system epss
scoring_elements 0.87414
published_at 2026-04-08T12:55:00Z
8
value 0.03404
scoring_system epss
scoring_elements 0.87421
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1543
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1011859
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1011859
5
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
6
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
7
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
8
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-54.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-54.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/67969
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67969
12
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1108682
reference_id 1108682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1108682
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543
reference_id CVE-2014-1543
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1543
reference_id CVE-2014-1543
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1543
17
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-54
reference_id mfsa2014-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-54
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1543
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqyr-zs78-13en
53
url VCID-bu79-vmrf-v7cy
vulnerability_id VCID-bu79-vmrf-v7cy
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json
10
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1576
reference_id
reference_type
scores
0
value 0.04667
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-13T12:55:00Z
1
value 0.04667
scoring_system epss
scoring_elements 0.89276
published_at 2026-04-01T12:55:00Z
2
value 0.04667
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-11T12:55:00Z
3
value 0.04667
scoring_system epss
scoring_elements 0.89326
published_at 2026-04-12T12:55:00Z
4
value 0.04667
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-02T12:55:00Z
5
value 0.04667
scoring_system epss
scoring_elements 0.89295
published_at 2026-04-04T12:55:00Z
6
value 0.04667
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-07T12:55:00Z
7
value 0.04667
scoring_system epss
scoring_elements 0.89315
published_at 2026-04-08T12:55:00Z
8
value 0.04667
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1576
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
21
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
22
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
23
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
24
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
25
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
26
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
27
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
28
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-75.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-75.html
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
30
reference_url http://www.securityfocus.com/bid/70430
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70430
31
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
32
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
33
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
34
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152358
reference_id 1152358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152358
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1576
reference_id CVE-2014-1576
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1576
43
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
44
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-75
reference_id mfsa2014-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-75
45
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
46
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
47
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1576
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bu79-vmrf-v7cy
54
url VCID-cdpz-9xmq-nygt
vulnerability_id VCID-cdpz-9xmq-nygt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5596
reference_id
reference_type
scores
0
value 0.01775
scoring_system epss
scoring_elements 0.82674
published_at 2026-04-13T12:55:00Z
1
value 0.01775
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-01T12:55:00Z
2
value 0.01775
scoring_system epss
scoring_elements 0.82623
published_at 2026-04-02T12:55:00Z
3
value 0.01775
scoring_system epss
scoring_elements 0.82638
published_at 2026-04-04T12:55:00Z
4
value 0.01775
scoring_system epss
scoring_elements 0.82634
published_at 2026-04-07T12:55:00Z
5
value 0.01775
scoring_system epss
scoring_elements 0.8266
published_at 2026-04-08T12:55:00Z
6
value 0.01775
scoring_system epss
scoring_elements 0.82667
published_at 2026-04-09T12:55:00Z
7
value 0.01775
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-11T12:55:00Z
8
value 0.01775
scoring_system epss
scoring_elements 0.82679
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5596
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023840
reference_id 1023840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023840
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596
reference_id CVE-2013-5596
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-97
reference_id mfsa2013-97
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-97
6
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
7
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5596
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdpz-9xmq-nygt
55
url VCID-cjda-dm64-kqg2
vulnerability_id VCID-cjda-dm64-kqg2
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1574
reference_id
reference_type
scores
0
value 0.01644
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-13T12:55:00Z
1
value 0.01644
scoring_system epss
scoring_elements 0.81896
published_at 2026-04-01T12:55:00Z
2
value 0.01644
scoring_system epss
scoring_elements 0.8198
published_at 2026-04-11T12:55:00Z
3
value 0.01644
scoring_system epss
scoring_elements 0.81969
published_at 2026-04-12T12:55:00Z
4
value 0.01644
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-02T12:55:00Z
5
value 0.01644
scoring_system epss
scoring_elements 0.8193
published_at 2026-04-04T12:55:00Z
6
value 0.01644
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-07T12:55:00Z
7
value 0.01644
scoring_system epss
scoring_elements 0.81953
published_at 2026-04-08T12:55:00Z
8
value 0.01644
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1574
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
27
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
28
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
29
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
30
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
31
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
32
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
33
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
34
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
35
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
36
reference_url http://www.securityfocus.com/bid/70436
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70436
37
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
38
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
39
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
40
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152356
reference_id 1152356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152356
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1574
reference_id CVE-2014-1574
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1574
49
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
reference_id mfsa2014-74
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
51
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
52
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
53
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
54
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1574
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2
56
url VCID-cnc6-yyk1-zqc3
vulnerability_id VCID-cnc6-yyk1-zqc3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6673
reference_id
reference_type
scores
0
value 0.00545
scoring_system epss
scoring_elements 0.67776
published_at 2026-04-13T12:55:00Z
1
value 0.00545
scoring_system epss
scoring_elements 0.677
published_at 2026-04-01T12:55:00Z
2
value 0.00545
scoring_system epss
scoring_elements 0.67734
published_at 2026-04-02T12:55:00Z
3
value 0.00545
scoring_system epss
scoring_elements 0.67755
published_at 2026-04-04T12:55:00Z
4
value 0.00545
scoring_system epss
scoring_elements 0.67735
published_at 2026-04-07T12:55:00Z
5
value 0.00545
scoring_system epss
scoring_elements 0.67786
published_at 2026-04-08T12:55:00Z
6
value 0.00545
scoring_system epss
scoring_elements 0.67801
published_at 2026-04-09T12:55:00Z
7
value 0.00545
scoring_system epss
scoring_elements 0.67824
published_at 2026-04-11T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.6781
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6673
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039428
reference_id 1039428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673
reference_id CVE-2013-6673
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-113
reference_id mfsa2013-113
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-113
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
7
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-6673
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnc6-yyk1-zqc3
57
url VCID-crfx-bba1-97b6
vulnerability_id VCID-crfx-bba1-97b6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0819
reference_id
reference_type
scores
0
value 0.00913
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-13T12:55:00Z
1
value 0.00913
scoring_system epss
scoring_elements 0.75804
published_at 2026-04-01T12:55:00Z
2
value 0.00913
scoring_system epss
scoring_elements 0.75808
published_at 2026-04-02T12:55:00Z
3
value 0.00913
scoring_system epss
scoring_elements 0.7584
published_at 2026-04-04T12:55:00Z
4
value 0.00913
scoring_system epss
scoring_elements 0.75819
published_at 2026-04-07T12:55:00Z
5
value 0.00913
scoring_system epss
scoring_elements 0.75852
published_at 2026-04-08T12:55:00Z
6
value 0.00913
scoring_system epss
scoring_elements 0.75864
published_at 2026-04-09T12:55:00Z
7
value 0.00913
scoring_system epss
scoring_elements 0.75887
published_at 2026-04-11T12:55:00Z
8
value 0.00913
scoring_system epss
scoring_elements 0.75868
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0819
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195640
reference_id 1195640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195640
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819
reference_id CVE-2015-0819
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-26
reference_id mfsa2015-26
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-26
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0819
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-crfx-bba1-97b6
58
url VCID-ct3d-sqe7-vyhh
vulnerability_id VCID-ct3d-sqe7-vyhh
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1505
reference_id
reference_type
scores
0
value 0.00578
scoring_system epss
scoring_elements 0.68834
published_at 2026-04-13T12:55:00Z
1
value 0.00578
scoring_system epss
scoring_elements 0.68768
published_at 2026-04-01T12:55:00Z
2
value 0.00578
scoring_system epss
scoring_elements 0.68787
published_at 2026-04-02T12:55:00Z
3
value 0.00578
scoring_system epss
scoring_elements 0.68807
published_at 2026-04-04T12:55:00Z
4
value 0.00578
scoring_system epss
scoring_elements 0.68785
published_at 2026-04-07T12:55:00Z
5
value 0.00578
scoring_system epss
scoring_elements 0.68836
published_at 2026-04-08T12:55:00Z
6
value 0.00578
scoring_system epss
scoring_elements 0.68855
published_at 2026-04-09T12:55:00Z
7
value 0.00578
scoring_system epss
scoring_elements 0.68878
published_at 2026-04-11T12:55:00Z
8
value 0.00578
scoring_system epss
scoring_elements 0.68863
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077029
reference_id 1077029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077029
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-28
reference_id mfsa2014-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-28
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1505
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ct3d-sqe7-vyhh
59
url VCID-db94-kcvc-zybp
vulnerability_id VCID-db94-kcvc-zybp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
reference_id
reference_type
scores
0
value 0.02874
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-13T12:55:00Z
1
value 0.02874
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-01T12:55:00Z
2
value 0.02874
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-02T12:55:00Z
3
value 0.02874
scoring_system epss
scoring_elements 0.86239
published_at 2026-04-04T12:55:00Z
4
value 0.02874
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-07T12:55:00Z
5
value 0.02874
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-08T12:55:00Z
6
value 0.02874
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-09T12:55:00Z
7
value 0.02874
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-11T12:55:00Z
8
value 0.02874
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
reference_id 1039422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
reference_id CVE-2013-5616
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
reference_id mfsa2013-108
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp
60
url VCID-dhhr-be6c-73a6
vulnerability_id VCID-dhhr-be6c-73a6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1509
reference_id
reference_type
scores
0
value 0.0081
scoring_system epss
scoring_elements 0.74223
published_at 2026-04-13T12:55:00Z
1
value 0.0081
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-01T12:55:00Z
2
value 0.0081
scoring_system epss
scoring_elements 0.74179
published_at 2026-04-07T12:55:00Z
3
value 0.0081
scoring_system epss
scoring_elements 0.74207
published_at 2026-04-04T12:55:00Z
4
value 0.0081
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-08T12:55:00Z
5
value 0.0081
scoring_system epss
scoring_elements 0.74227
published_at 2026-04-09T12:55:00Z
6
value 0.0081
scoring_system epss
scoring_elements 0.74248
published_at 2026-04-11T12:55:00Z
7
value 0.0081
scoring_system epss
scoring_elements 0.7423
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077028
reference_id 1077028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077028
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-27
reference_id mfsa2014-27
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-27
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhhr-be6c-73a6
61
url VCID-dm6s-ammq-33dp
vulnerability_id VCID-dm6s-ammq-33dp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0825
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71196
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71146
published_at 2026-04-01T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71156
published_at 2026-04-02T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71174
published_at 2026-04-04T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71149
published_at 2026-04-07T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-08T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71204
published_at 2026-04-09T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-11T12:55:00Z
8
value 0.00664
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0825
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195631
reference_id 1195631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825
reference_id CVE-2015-0825
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-21
reference_id mfsa2015-21
reference_type
scores
0
value medium
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-21
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0825
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp
62
url VCID-dn78-xcpj-97af
vulnerability_id VCID-dn78-xcpj-97af
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1561
reference_id
reference_type
scores
0
value 0.00752
scoring_system epss
scoring_elements 0.73177
published_at 2026-04-13T12:55:00Z
1
value 0.00752
scoring_system epss
scoring_elements 0.73123
published_at 2026-04-01T12:55:00Z
2
value 0.00752
scoring_system epss
scoring_elements 0.73203
published_at 2026-04-11T12:55:00Z
3
value 0.00752
scoring_system epss
scoring_elements 0.73184
published_at 2026-04-12T12:55:00Z
4
value 0.00752
scoring_system epss
scoring_elements 0.73134
published_at 2026-04-02T12:55:00Z
5
value 0.00752
scoring_system epss
scoring_elements 0.73155
published_at 2026-04-04T12:55:00Z
6
value 0.00752
scoring_system epss
scoring_elements 0.73129
published_at 2026-04-07T12:55:00Z
7
value 0.00752
scoring_system epss
scoring_elements 0.73165
published_at 2026-04-08T12:55:00Z
8
value 0.00752
scoring_system epss
scoring_elements 0.73179
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1561
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1000514
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1000514
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=910375
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=910375
4
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
5
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
6
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-60.html
7
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
8
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121473
reference_id 1121473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121473
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561
reference_id CVE-2014-1561
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1561
reference_id CVE-2014-1561
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1561
14
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-60
reference_id mfsa2014-60
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-60
16
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1561
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn78-xcpj-97af
63
url VCID-dtrc-mwu9-2bdf
vulnerability_id VCID-dtrc-mwu9-2bdf
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
reference_id
reference_type
scores
0
value 0.0279
scoring_system epss
scoring_elements 0.86084
published_at 2026-04-13T12:55:00Z
1
value 0.0279
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-01T12:55:00Z
2
value 0.0279
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-02T12:55:00Z
3
value 0.0279
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-07T12:55:00Z
4
value 0.0279
scoring_system epss
scoring_elements 0.86067
published_at 2026-04-08T12:55:00Z
5
value 0.0279
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-09T12:55:00Z
6
value 0.0279
scoring_system epss
scoring_elements 0.86092
published_at 2026-04-11T12:55:00Z
7
value 0.0279
scoring_system epss
scoring_elements 0.86089
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
reference_id 1030807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://access.redhat.com/errata/RHSA-2013:1840
reference_id RHSA-2013:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1840
10
reference_url https://access.redhat.com/errata/RHSA-2013:1841
reference_id RHSA-2013:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1841
11
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
12
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
13
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
14
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5605
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrc-mwu9-2bdf
64
url VCID-dzfq-91b8-kqcd
vulnerability_id VCID-dzfq-91b8-kqcd
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1482
reference_id
reference_type
scores
0
value 0.02741
scoring_system epss
scoring_elements 0.85983
published_at 2026-04-13T12:55:00Z
1
value 0.02741
scoring_system epss
scoring_elements 0.85917
published_at 2026-04-01T12:55:00Z
2
value 0.02741
scoring_system epss
scoring_elements 0.85929
published_at 2026-04-02T12:55:00Z
3
value 0.02741
scoring_system epss
scoring_elements 0.85945
published_at 2026-04-04T12:55:00Z
4
value 0.02741
scoring_system epss
scoring_elements 0.85947
published_at 2026-04-07T12:55:00Z
5
value 0.02741
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-08T12:55:00Z
6
value 0.02741
scoring_system epss
scoring_elements 0.85976
published_at 2026-04-09T12:55:00Z
7
value 0.02741
scoring_system epss
scoring_elements 0.8599
published_at 2026-04-11T12:55:00Z
8
value 0.02741
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1482
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060942
reference_id 1060942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060942
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-04
reference_id mfsa2014-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1482
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzfq-91b8-kqcd
65
url VCID-dzyy-5mb7-kugn
vulnerability_id VCID-dzyy-5mb7-kugn
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5590
reference_id
reference_type
scores
0
value 0.02058
scoring_system epss
scoring_elements 0.83895
published_at 2026-04-13T12:55:00Z
1
value 0.02058
scoring_system epss
scoring_elements 0.83828
published_at 2026-04-01T12:55:00Z
2
value 0.02058
scoring_system epss
scoring_elements 0.83841
published_at 2026-04-02T12:55:00Z
3
value 0.02058
scoring_system epss
scoring_elements 0.83856
published_at 2026-04-04T12:55:00Z
4
value 0.02058
scoring_system epss
scoring_elements 0.83859
published_at 2026-04-07T12:55:00Z
5
value 0.02058
scoring_system epss
scoring_elements 0.83882
published_at 2026-04-08T12:55:00Z
6
value 0.02058
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-09T12:55:00Z
7
value 0.02058
scoring_system epss
scoring_elements 0.83905
published_at 2026-04-11T12:55:00Z
8
value 0.02058
scoring_system epss
scoring_elements 0.83899
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023835
reference_id 1023835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023835
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
reference_id mfsa2013-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5590
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzyy-5mb7-kugn
66
url VCID-e1ef-b4f7-7yd8
vulnerability_id VCID-e1ef-b4f7-7yd8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1594
reference_id
reference_type
scores
0
value 0.01693
scoring_system epss
scoring_elements 0.82253
published_at 2026-04-13T12:55:00Z
1
value 0.01693
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-01T12:55:00Z
2
value 0.01693
scoring_system epss
scoring_elements 0.82266
published_at 2026-04-11T12:55:00Z
3
value 0.01693
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-12T12:55:00Z
4
value 0.01693
scoring_system epss
scoring_elements 0.82197
published_at 2026-04-02T12:55:00Z
5
value 0.01693
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-04T12:55:00Z
6
value 0.01693
scoring_system epss
scoring_elements 0.82213
published_at 2026-04-07T12:55:00Z
7
value 0.01693
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-08T12:55:00Z
8
value 0.01693
scoring_system epss
scoring_elements 0.82247
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1594
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71396
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71396
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169210
reference_id 1169210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169210
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1594
reference_id CVE-2014-1594
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1594
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-89
reference_id mfsa2014-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-89
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1594
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8
67
url VCID-ep8z-jvbx-rqcj
vulnerability_id VCID-ep8z-jvbx-rqcj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0836
reference_id
reference_type
scores
0
value 0.01493
scoring_system epss
scoring_elements 0.81065
published_at 2026-04-13T12:55:00Z
1
value 0.01493
scoring_system epss
scoring_elements 0.81002
published_at 2026-04-01T12:55:00Z
2
value 0.01493
scoring_system epss
scoring_elements 0.81011
published_at 2026-04-02T12:55:00Z
3
value 0.01493
scoring_system epss
scoring_elements 0.81035
published_at 2026-04-04T12:55:00Z
4
value 0.01493
scoring_system epss
scoring_elements 0.81034
published_at 2026-04-07T12:55:00Z
5
value 0.01493
scoring_system epss
scoring_elements 0.81062
published_at 2026-04-08T12:55:00Z
6
value 0.01493
scoring_system epss
scoring_elements 0.81068
published_at 2026-04-09T12:55:00Z
7
value 0.01493
scoring_system epss
scoring_elements 0.81086
published_at 2026-04-11T12:55:00Z
8
value 0.01493
scoring_system epss
scoring_elements 0.81072
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195605
reference_id 1195605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195605
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
reference_id mfsa2015-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj
68
url VCID-f1nz-g5h1-m7dm
vulnerability_id VCID-f1nz-g5h1-m7dm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8638
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65798
published_at 2026-04-13T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65713
published_at 2026-04-01T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65763
published_at 2026-04-02T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65793
published_at 2026-04-04T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65758
published_at 2026-04-07T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-08T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65822
published_at 2026-04-09T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65842
published_at 2026-04-11T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65828
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8638
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180966
reference_id 1180966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180966
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-03
reference_id mfsa2015-03
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-03
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://access.redhat.com/errata/RHSA-2015:0047
reference_id RHSA-2015:0047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0047
11
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
12
reference_url https://usn.ubuntu.com/2460-1/
reference_id USN-2460-1
reference_type
scores
url https://usn.ubuntu.com/2460-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8638
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm
69
url VCID-f7my-dd2c-mfex
vulnerability_id VCID-f7my-dd2c-mfex
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1589
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53741
published_at 2026-04-13T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.5366
published_at 2026-04-01T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53774
published_at 2026-04-11T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53758
published_at 2026-04-12T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.5368
published_at 2026-04-02T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53707
published_at 2026-04-04T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53675
published_at 2026-04-07T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53728
published_at 2026-04-08T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53726
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1589
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169205
reference_id 1169205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169205
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589
reference_id CVE-2014-1589
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1589
reference_id CVE-2014-1589
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1589
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-84
reference_id mfsa2014-84
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-84
12
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1589
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7my-dd2c-mfex
70
url VCID-faad-47h1-nbh3
vulnerability_id VCID-faad-47h1-nbh3
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0741.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0741.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0742.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0742.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-0741.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0741.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-0742.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0742.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1538
reference_id
reference_type
scores
0
value 0.02681
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-13T12:55:00Z
1
value 0.02681
scoring_system epss
scoring_elements 0.85769
published_at 2026-04-01T12:55:00Z
2
value 0.02681
scoring_system epss
scoring_elements 0.8585
published_at 2026-04-11T12:55:00Z
3
value 0.02681
scoring_system epss
scoring_elements 0.85846
published_at 2026-04-12T12:55:00Z
4
value 0.02681
scoring_system epss
scoring_elements 0.85782
published_at 2026-04-02T12:55:00Z
5
value 0.02681
scoring_system epss
scoring_elements 0.858
published_at 2026-04-04T12:55:00Z
6
value 0.02681
scoring_system epss
scoring_elements 0.85806
published_at 2026-04-07T12:55:00Z
7
value 0.02681
scoring_system epss
scoring_elements 0.85824
published_at 2026-04-08T12:55:00Z
8
value 0.02681
scoring_system epss
scoring_elements 0.85835
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1538
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1005584
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1005584
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
16
reference_url http://secunia.com/advisories/58984
reference_id
reference_type
scores
url http://secunia.com/advisories/58984
17
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
18
reference_url http://secunia.com/advisories/59149
reference_id
reference_type
scores
url http://secunia.com/advisories/59149
19
reference_url http://secunia.com/advisories/59150
reference_id
reference_type
scores
url http://secunia.com/advisories/59150
20
reference_url http://secunia.com/advisories/59165
reference_id
reference_type
scores
url http://secunia.com/advisories/59165
21
reference_url http://secunia.com/advisories/59169
reference_id
reference_type
scores
url http://secunia.com/advisories/59169
22
reference_url http://secunia.com/advisories/59170
reference_id
reference_type
scores
url http://secunia.com/advisories/59170
23
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
24
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
25
reference_url http://secunia.com/advisories/59275
reference_id
reference_type
scores
url http://secunia.com/advisories/59275
26
reference_url http://secunia.com/advisories/59328
reference_id
reference_type
scores
url http://secunia.com/advisories/59328
27
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
28
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
29
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
30
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
31
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
32
reference_url http://www.debian.org/security/2014/dsa-2955
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2955
33
reference_url http://www.debian.org/security/2014/dsa-2960
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2960
34
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
35
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
36
reference_url http://www.securityfocus.com/bid/67976
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67976
37
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
38
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
39
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
40
reference_url http://www.ubuntu.com/usn/USN-2250-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2250-1
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107421
reference_id 1107421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107421
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1538
reference_id CVE-2014-1538
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1538
61
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
reference_id mfsa2014-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
63
reference_url https://access.redhat.com/errata/RHSA-2014:0741
reference_id RHSA-2014:0741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0741
64
reference_url https://access.redhat.com/errata/RHSA-2014:0742
reference_id RHSA-2014:0742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0742
65
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
66
reference_url https://usn.ubuntu.com/2250-1/
reference_id USN-2250-1
reference_type
scores
url https://usn.ubuntu.com/2250-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1538
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-faad-47h1-nbh3
71
url VCID-fwk8-2rdv-cycf
vulnerability_id VCID-fwk8-2rdv-cycf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1575
reference_id
reference_type
scores
0
value 0.0199
scoring_system epss
scoring_elements 0.83613
published_at 2026-04-13T12:55:00Z
1
value 0.0199
scoring_system epss
scoring_elements 0.83547
published_at 2026-04-01T12:55:00Z
2
value 0.0199
scoring_system epss
scoring_elements 0.83624
published_at 2026-04-11T12:55:00Z
3
value 0.0199
scoring_system epss
scoring_elements 0.83618
published_at 2026-04-12T12:55:00Z
4
value 0.0199
scoring_system epss
scoring_elements 0.8356
published_at 2026-04-02T12:55:00Z
5
value 0.0199
scoring_system epss
scoring_elements 0.83574
published_at 2026-04-04T12:55:00Z
6
value 0.0199
scoring_system epss
scoring_elements 0.83576
published_at 2026-04-07T12:55:00Z
7
value 0.0199
scoring_system epss
scoring_elements 0.836
published_at 2026-04-08T12:55:00Z
8
value 0.0199
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1575
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1001994
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1001994
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1018916
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1018916
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020034
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020034
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1023035
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1023035
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1032208
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1032208
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1033020
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1033020
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1034230
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1034230
13
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
14
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
15
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
16
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
17
reference_url http://www.securityfocus.com/bid/70439
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70439
18
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
19
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
20
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152357
reference_id 1152357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152357
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575
reference_id CVE-2014-1575
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1575
reference_id CVE-2014-1575
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1575
28
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
reference_id mfsa2014-74
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
30
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1575
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk8-2rdv-cycf
72
url VCID-g4rq-n73t-rbcr
vulnerability_id VCID-g4rq-n73t-rbcr
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0918.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0918.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1557
reference_id
reference_type
scores
0
value 0.02434
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-13T12:55:00Z
1
value 0.02434
scoring_system epss
scoring_elements 0.85089
published_at 2026-04-01T12:55:00Z
2
value 0.02434
scoring_system epss
scoring_elements 0.85166
published_at 2026-04-11T12:55:00Z
3
value 0.02434
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-12T12:55:00Z
4
value 0.02434
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-02T12:55:00Z
5
value 0.02434
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-04T12:55:00Z
6
value 0.02434
scoring_system epss
scoring_elements 0.85122
published_at 2026-04-07T12:55:00Z
7
value 0.02434
scoring_system epss
scoring_elements 0.85144
published_at 2026-04-08T12:55:00Z
8
value 0.02434
scoring_system epss
scoring_elements 0.85151
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1557
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=913805
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=913805
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
9
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
10
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
11
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
12
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
13
reference_url http://secunia.com/advisories/60306
reference_id
reference_type
scores
url http://secunia.com/advisories/60306
14
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
15
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
16
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
17
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
18
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
19
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-64.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-64.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
21
reference_url http://www.securityfocus.com/bid/68824
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68824
22
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
23
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121479
reference_id 1121479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121479
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1557
reference_id CVE-2014-1557
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1557
49
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-64
reference_id mfsa2014-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-64
51
reference_url https://access.redhat.com/errata/RHSA-2014:0918
reference_id RHSA-2014:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0918
52
reference_url https://access.redhat.com/errata/RHSA-2014:0919
reference_id RHSA-2014:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0919
53
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
54
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1557
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rq-n73t-rbcr
73
url VCID-g8ft-s7wx-n7ea
vulnerability_id VCID-g8ft-s7wx-n7ea
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8639
reference_id
reference_type
scores
0
value 0.01837
scoring_system epss
scoring_elements 0.82938
published_at 2026-04-13T12:55:00Z
1
value 0.01837
scoring_system epss
scoring_elements 0.82873
published_at 2026-04-01T12:55:00Z
2
value 0.01837
scoring_system epss
scoring_elements 0.82889
published_at 2026-04-02T12:55:00Z
3
value 0.01837
scoring_system epss
scoring_elements 0.82902
published_at 2026-04-04T12:55:00Z
4
value 0.01837
scoring_system epss
scoring_elements 0.82898
published_at 2026-04-07T12:55:00Z
5
value 0.01837
scoring_system epss
scoring_elements 0.82924
published_at 2026-04-08T12:55:00Z
6
value 0.01837
scoring_system epss
scoring_elements 0.82931
published_at 2026-04-09T12:55:00Z
7
value 0.01837
scoring_system epss
scoring_elements 0.82947
published_at 2026-04-11T12:55:00Z
8
value 0.01837
scoring_system epss
scoring_elements 0.82942
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180967
reference_id 1180967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180967
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-04
reference_id mfsa2015-04
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-04
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://access.redhat.com/errata/RHSA-2015:0047
reference_id RHSA-2015:0047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0047
11
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
12
reference_url https://usn.ubuntu.com/2460-1/
reference_id USN-2460-1
reference_type
scores
url https://usn.ubuntu.com/2460-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8639
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8ft-s7wx-n7ea
74
url VCID-ggs9-bydj-sue4
vulnerability_id VCID-ggs9-bydj-sue4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1558
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68321
published_at 2026-04-13T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68256
published_at 2026-04-01T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.68366
published_at 2026-04-11T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68353
published_at 2026-04-12T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68276
published_at 2026-04-02T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68296
published_at 2026-04-04T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.68273
published_at 2026-04-07T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-08T12:55:00Z
8
value 0.00562
scoring_system epss
scoring_elements 0.6834
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1558
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1015973
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1015973
3
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
4
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
5
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
6
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
reference_id 1121480
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558
reference_id CVE-2014-1558
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1558
reference_id CVE-2014-1558
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1558
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
reference_id mfsa2014-65
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
23
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
24
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1558
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggs9-bydj-sue4
75
url VCID-gsx1-3jjx-nqan
vulnerability_id VCID-gsx1-3jjx-nqan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-12T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.72842
published_at 2026-04-01T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-02T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72869
published_at 2026-04-04T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72844
published_at 2026-04-07T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72882
published_at 2026-04-08T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72896
published_at 2026-04-13T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72921
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
reference_id 1039420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
reference_id CVE-2013-5612
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
reference_id mfsa2013-106
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5612
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan
76
url VCID-gx4v-yve4-gbga
vulnerability_id VCID-gx4v-yve4-gbga
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8640
reference_id
reference_type
scores
0
value 0.0114
scoring_system epss
scoring_elements 0.78438
published_at 2026-04-11T12:55:00Z
1
value 0.0114
scoring_system epss
scoring_elements 0.78359
published_at 2026-04-01T12:55:00Z
2
value 0.0114
scoring_system epss
scoring_elements 0.78366
published_at 2026-04-02T12:55:00Z
3
value 0.0114
scoring_system epss
scoring_elements 0.78397
published_at 2026-04-04T12:55:00Z
4
value 0.0114
scoring_system epss
scoring_elements 0.7838
published_at 2026-04-07T12:55:00Z
5
value 0.0114
scoring_system epss
scoring_elements 0.78407
published_at 2026-04-08T12:55:00Z
6
value 0.0114
scoring_system epss
scoring_elements 0.78412
published_at 2026-04-09T12:55:00Z
7
value 0.01542
scoring_system epss
scoring_elements 0.81374
published_at 2026-04-13T12:55:00Z
8
value 0.01542
scoring_system epss
scoring_elements 0.81381
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8640
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180970
reference_id 1180970
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180970
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640
reference_id CVE-2014-8640
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-05
reference_id mfsa2015-05
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-05
6
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8640
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga
77
url VCID-hb1k-vzww-8bbm
vulnerability_id VCID-hb1k-vzww-8bbm
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1581
reference_id
reference_type
scores
0
value 0.02306
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-13T12:55:00Z
1
value 0.02306
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-01T12:55:00Z
2
value 0.02306
scoring_system epss
scoring_elements 0.84762
published_at 2026-04-11T12:55:00Z
3
value 0.02306
scoring_system epss
scoring_elements 0.84758
published_at 2026-04-12T12:55:00Z
4
value 0.02306
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-02T12:55:00Z
5
value 0.02306
scoring_system epss
scoring_elements 0.84713
published_at 2026-04-04T12:55:00Z
6
value 0.02306
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-07T12:55:00Z
7
value 0.02306
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-08T12:55:00Z
8
value 0.02306
scoring_system epss
scoring_elements 0.84744
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1581
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
22
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
23
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
24
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
25
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
26
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
27
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
28
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
29
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
31
reference_url http://www.securityfocus.com/bid/70426
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70426
32
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
33
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
34
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
35
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152363
reference_id 1152363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152363
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1581
reference_id CVE-2014-1581
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1581
44
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-79
reference_id mfsa2014-79
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-79
46
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
47
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
48
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
49
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1581
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm
78
url VCID-hedr-7c4z-nfa9
vulnerability_id VCID-hedr-7c4z-nfa9
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1567
reference_id
reference_type
scores
0
value 0.02248
scoring_system epss
scoring_elements 0.84581
published_at 2026-04-13T12:55:00Z
1
value 0.02248
scoring_system epss
scoring_elements 0.84503
published_at 2026-04-01T12:55:00Z
2
value 0.02248
scoring_system epss
scoring_elements 0.8459
published_at 2026-04-11T12:55:00Z
3
value 0.02248
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-12T12:55:00Z
4
value 0.02248
scoring_system epss
scoring_elements 0.84518
published_at 2026-04-02T12:55:00Z
5
value 0.02248
scoring_system epss
scoring_elements 0.8454
published_at 2026-04-04T12:55:00Z
6
value 0.02248
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-07T12:55:00Z
7
value 0.02248
scoring_system epss
scoring_elements 0.84565
published_at 2026-04-08T12:55:00Z
8
value 0.02248
scoring_system epss
scoring_elements 0.84571
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1567
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1037641
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1037641
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
12
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
13
reference_url http://secunia.com/advisories/60186
reference_id
reference_type
scores
url http://secunia.com/advisories/60186
14
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
15
reference_url http://secunia.com/advisories/61390
reference_id
reference_type
scores
url http://secunia.com/advisories/61390
16
reference_url http://www.debian.org/security/2014/dsa-3018
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3018
17
reference_url http://www.debian.org/security/2014/dsa-3028
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3028
18
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-72.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-72.html
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
20
reference_url http://www.securityfocus.com/bid/69520
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69520
21
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
22
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135869
reference_id 1135869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135869
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1567
reference_id CVE-2014-1567
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1567
50
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-72
reference_id mfsa2014-72
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-72
52
reference_url https://access.redhat.com/errata/RHSA-2014:1144
reference_id RHSA-2014:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1144
53
reference_url https://access.redhat.com/errata/RHSA-2014:1145
reference_id RHSA-2014:1145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1145
54
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
55
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1567
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hedr-7c4z-nfa9
79
url VCID-hmmv-8y6q-hbgc
vulnerability_id VCID-hmmv-8y6q-hbgc
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5601
reference_id
reference_type
scores
0
value 0.02688
scoring_system epss
scoring_elements 0.85861
published_at 2026-04-13T12:55:00Z
1
value 0.02688
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-01T12:55:00Z
2
value 0.02688
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-02T12:55:00Z
3
value 0.02688
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-04T12:55:00Z
4
value 0.02688
scoring_system epss
scoring_elements 0.85824
published_at 2026-04-07T12:55:00Z
5
value 0.02688
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-08T12:55:00Z
6
value 0.02688
scoring_system epss
scoring_elements 0.85853
published_at 2026-04-09T12:55:00Z
7
value 0.02688
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-11T12:55:00Z
8
value 0.02688
scoring_system epss
scoring_elements 0.85865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
reference_id 1023843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
reference_id mfsa2013-100
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5601
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmv-8y6q-hbgc
80
url VCID-hrzr-h3xb-e3ed
vulnerability_id VCID-hrzr-h3xb-e3ed
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1536
reference_id
reference_type
scores
0
value 0.01355
scoring_system epss
scoring_elements 0.80119
published_at 2026-04-13T12:55:00Z
1
value 0.01355
scoring_system epss
scoring_elements 0.80073
published_at 2026-04-01T12:55:00Z
2
value 0.01355
scoring_system epss
scoring_elements 0.80144
published_at 2026-04-11T12:55:00Z
3
value 0.01355
scoring_system epss
scoring_elements 0.80128
published_at 2026-04-12T12:55:00Z
4
value 0.01355
scoring_system epss
scoring_elements 0.80081
published_at 2026-04-02T12:55:00Z
5
value 0.01355
scoring_system epss
scoring_elements 0.80101
published_at 2026-04-04T12:55:00Z
6
value 0.01355
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-07T12:55:00Z
7
value 0.01355
scoring_system epss
scoring_elements 0.80118
published_at 2026-04-08T12:55:00Z
8
value 0.01355
scoring_system epss
scoring_elements 0.80125
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1536
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=989994
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=989994
8
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
9
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
10
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
11
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
12
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
13
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
14
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
15
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
16
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-49.html
17
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
18
reference_url http://www.securityfocus.com/bid/67966
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67966
19
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
20
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
21
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107419
reference_id 1107419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107419
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536
reference_id CVE-2014-1536
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1536
reference_id CVE-2014-1536
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1536
26
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
reference_id mfsa2014-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-49
28
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1536
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrzr-h3xb-e3ed
81
url VCID-hx2h-j392-7ye8
vulnerability_id VCID-hx2h-j392-7ye8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5603
reference_id
reference_type
scores
0
value 0.0527
scoring_system epss
scoring_elements 0.90004
published_at 2026-04-12T12:55:00Z
1
value 0.0527
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-01T12:55:00Z
2
value 0.0527
scoring_system epss
scoring_elements 0.89958
published_at 2026-04-02T12:55:00Z
3
value 0.0527
scoring_system epss
scoring_elements 0.8997
published_at 2026-04-04T12:55:00Z
4
value 0.0527
scoring_system epss
scoring_elements 0.89977
published_at 2026-04-07T12:55:00Z
5
value 0.0527
scoring_system epss
scoring_elements 0.89993
published_at 2026-04-08T12:55:00Z
6
value 0.0527
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-13T12:55:00Z
7
value 0.0527
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5603
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023845
reference_id 1023845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023845
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603
reference_id CVE-2013-5603
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-102
reference_id mfsa2013-102
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-102
6
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
7
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5603
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx2h-j392-7ye8
82
url VCID-jb34-jknb-yygv
vulnerability_id VCID-jb34-jknb-yygv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0817
reference_id
reference_type
scores
0
value 0.0134
scoring_system epss
scoring_elements 0.80012
published_at 2026-04-13T12:55:00Z
1
value 0.0134
scoring_system epss
scoring_elements 0.7996
published_at 2026-04-01T12:55:00Z
2
value 0.0134
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-02T12:55:00Z
3
value 0.0134
scoring_system epss
scoring_elements 0.79989
published_at 2026-04-04T12:55:00Z
4
value 0.0134
scoring_system epss
scoring_elements 0.79979
published_at 2026-04-07T12:55:00Z
5
value 0.0134
scoring_system epss
scoring_elements 0.80007
published_at 2026-04-08T12:55:00Z
6
value 0.0134
scoring_system epss
scoring_elements 0.80016
published_at 2026-04-09T12:55:00Z
7
value 0.0134
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-11T12:55:00Z
8
value 0.0134
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1204362
reference_id 1204362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1204362
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-29
reference_id mfsa2015-29
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-29
7
reference_url https://access.redhat.com/errata/RHSA-2015:0718
reference_id RHSA-2015:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0718
8
reference_url https://usn.ubuntu.com/2538-1/
reference_id USN-2538-1
reference_type
scores
url https://usn.ubuntu.com/2538-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0817
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jb34-jknb-yygv
83
url VCID-jj3q-bub2-y3b2
vulnerability_id VCID-jj3q-bub2-y3b2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0822
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.70468
published_at 2026-04-13T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70403
published_at 2026-04-01T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70417
published_at 2026-04-02T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.70434
published_at 2026-04-04T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70413
published_at 2026-04-07T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70458
published_at 2026-04-08T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70474
published_at 2026-04-09T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70498
published_at 2026-04-11T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70483
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0822
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195638
reference_id 1195638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195638
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-24
reference_id mfsa2015-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-24
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0822
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2
84
url VCID-jm5w-6pdb-bbes
vulnerability_id VCID-jm5w-6pdb-bbes
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
reference_id
reference_type
scores
0
value 0.00661
scoring_system epss
scoring_elements 0.71141
published_at 2026-04-13T12:55:00Z
1
value 0.00661
scoring_system epss
scoring_elements 0.71092
published_at 2026-04-01T12:55:00Z
2
value 0.00661
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-02T12:55:00Z
3
value 0.00661
scoring_system epss
scoring_elements 0.71119
published_at 2026-04-04T12:55:00Z
4
value 0.00661
scoring_system epss
scoring_elements 0.71094
published_at 2026-04-07T12:55:00Z
5
value 0.00661
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-08T12:55:00Z
6
value 0.00661
scoring_system epss
scoring_elements 0.71148
published_at 2026-04-09T12:55:00Z
7
value 0.00661
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-11T12:55:00Z
8
value 0.00661
scoring_system epss
scoring_elements 0.71157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
reference_id 1031457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
14
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5606
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm5w-6pdb-bbes
85
url VCID-jneb-mxc6-17a4
vulnerability_id VCID-jneb-mxc6-17a4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1559
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68321
published_at 2026-04-13T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68256
published_at 2026-04-01T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.68366
published_at 2026-04-11T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68353
published_at 2026-04-12T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68276
published_at 2026-04-02T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68296
published_at 2026-04-04T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.68273
published_at 2026-04-07T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-08T12:55:00Z
8
value 0.00562
scoring_system epss
scoring_elements 0.6834
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1559
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1026022
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1026022
3
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
4
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-65.html
5
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
6
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
7
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
reference_id 1121480
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121480
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559
reference_id CVE-2014-1559
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1559
reference_id CVE-2014-1559
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1559
22
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
reference_id mfsa2014-65
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-65
24
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
25
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1559
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jneb-mxc6-17a4
86
url VCID-jxwt-ya4f-wqbg
vulnerability_id VCID-jxwt-ya4f-wqbg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1549
reference_id
reference_type
scores
0
value 0.03137
scoring_system epss
scoring_elements 0.86876
published_at 2026-04-13T12:55:00Z
1
value 0.03137
scoring_system epss
scoring_elements 0.86821
published_at 2026-04-01T12:55:00Z
2
value 0.03137
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-11T12:55:00Z
3
value 0.03137
scoring_system epss
scoring_elements 0.86881
published_at 2026-04-12T12:55:00Z
4
value 0.03137
scoring_system epss
scoring_elements 0.86832
published_at 2026-04-02T12:55:00Z
5
value 0.03137
scoring_system epss
scoring_elements 0.86851
published_at 2026-04-04T12:55:00Z
6
value 0.03137
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-07T12:55:00Z
7
value 0.03137
scoring_system epss
scoring_elements 0.86864
published_at 2026-04-08T12:55:00Z
8
value 0.03137
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1549
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020205
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020205
3
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
4
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
5
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-57.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-57.html
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
7
reference_url http://www.securityfocus.com/bid/68820
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68820
8
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
9
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121470
reference_id 1121470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121470
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549
reference_id CVE-2014-1549
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1549
reference_id CVE-2014-1549
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1549
24
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-57
reference_id mfsa2014-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-57
26
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
27
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1549
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwt-ya4f-wqbg
87
url VCID-k1sx-wcjc-jqcr
vulnerability_id VCID-k1sx-wcjc-jqcr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5619
reference_id
reference_type
scores
0
value 0.0173
scoring_system epss
scoring_elements 0.82454
published_at 2026-04-13T12:55:00Z
1
value 0.0173
scoring_system epss
scoring_elements 0.82381
published_at 2026-04-01T12:55:00Z
2
value 0.0173
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-02T12:55:00Z
3
value 0.0173
scoring_system epss
scoring_elements 0.82413
published_at 2026-04-04T12:55:00Z
4
value 0.0173
scoring_system epss
scoring_elements 0.8241
published_at 2026-04-07T12:55:00Z
5
value 0.0173
scoring_system epss
scoring_elements 0.82438
published_at 2026-04-08T12:55:00Z
6
value 0.0173
scoring_system epss
scoring_elements 0.82445
published_at 2026-04-09T12:55:00Z
7
value 0.0173
scoring_system epss
scoring_elements 0.82464
published_at 2026-04-11T12:55:00Z
8
value 0.0173
scoring_system epss
scoring_elements 0.82459
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5619
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039424
reference_id 1039424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039424
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619
reference_id CVE-2013-5619
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-110
reference_id mfsa2013-110
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-110
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5619
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1sx-wcjc-jqcr
88
url VCID-k69z-4hzh-5yd4
vulnerability_id VCID-k69z-4hzh-5yd4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0827
reference_id
reference_type
scores
0
value 0.00997
scoring_system epss
scoring_elements 0.76951
published_at 2026-04-13T12:55:00Z
1
value 0.00997
scoring_system epss
scoring_elements 0.76886
published_at 2026-04-01T12:55:00Z
2
value 0.00997
scoring_system epss
scoring_elements 0.76893
published_at 2026-04-02T12:55:00Z
3
value 0.00997
scoring_system epss
scoring_elements 0.76923
published_at 2026-04-04T12:55:00Z
4
value 0.00997
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-07T12:55:00Z
5
value 0.00997
scoring_system epss
scoring_elements 0.76937
published_at 2026-04-08T12:55:00Z
6
value 0.00997
scoring_system epss
scoring_elements 0.76948
published_at 2026-04-09T12:55:00Z
7
value 0.00997
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-11T12:55:00Z
8
value 0.00997
scoring_system epss
scoring_elements 0.76955
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0827
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195623
reference_id 1195623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195623
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-19
reference_id mfsa2015-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-19
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0827
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4
89
url VCID-k7cw-7tng-xka2
vulnerability_id VCID-k7cw-7tng-xka2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1530
reference_id
reference_type
scores
0
value 0.00865
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-13T12:55:00Z
1
value 0.00865
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-01T12:55:00Z
2
value 0.00865
scoring_system epss
scoring_elements 0.75066
published_at 2026-04-02T12:55:00Z
3
value 0.00865
scoring_system epss
scoring_elements 0.75096
published_at 2026-04-04T12:55:00Z
4
value 0.00865
scoring_system epss
scoring_elements 0.75073
published_at 2026-04-07T12:55:00Z
5
value 0.00865
scoring_system epss
scoring_elements 0.75107
published_at 2026-04-08T12:55:00Z
6
value 0.00865
scoring_system epss
scoring_elements 0.75118
published_at 2026-04-09T12:55:00Z
7
value 0.00865
scoring_system epss
scoring_elements 0.7514
published_at 2026-04-11T12:55:00Z
8
value 0.00865
scoring_system epss
scoring_elements 0.75119
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092666
reference_id 1092666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092666
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-43
reference_id mfsa2014-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-43
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1530
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k7cw-7tng-xka2
90
url VCID-kcmm-pwr4-cqcm
vulnerability_id VCID-kcmm-pwr4-cqcm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1539
reference_id
reference_type
scores
0
value 0.0075
scoring_system epss
scoring_elements 0.73135
published_at 2026-04-13T12:55:00Z
1
value 0.0075
scoring_system epss
scoring_elements 0.73083
published_at 2026-04-01T12:55:00Z
2
value 0.0075
scoring_system epss
scoring_elements 0.73162
published_at 2026-04-11T12:55:00Z
3
value 0.0075
scoring_system epss
scoring_elements 0.73142
published_at 2026-04-12T12:55:00Z
4
value 0.0075
scoring_system epss
scoring_elements 0.73093
published_at 2026-04-02T12:55:00Z
5
value 0.0075
scoring_system epss
scoring_elements 0.73114
published_at 2026-04-04T12:55:00Z
6
value 0.0075
scoring_system epss
scoring_elements 0.73088
published_at 2026-04-07T12:55:00Z
7
value 0.0075
scoring_system epss
scoring_elements 0.73124
published_at 2026-04-08T12:55:00Z
8
value 0.0075
scoring_system epss
scoring_elements 0.73137
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1539
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995603
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995603
4
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
5
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
6
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
7
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-50.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-50.html
8
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
9
reference_url http://www.securityfocus.com/bid/67967
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67967
10
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539
reference_id CVE-2014-1539
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1539
reference_id CVE-2014-1539
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1539
24
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-50
reference_id mfsa2014-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-50
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1539
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcmm-pwr4-cqcm
91
url VCID-kway-xy2z-5fak
vulnerability_id VCID-kway-xy2z-5fak
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0918.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0918.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1555
reference_id
reference_type
scores
0
value 0.03359
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-13T12:55:00Z
1
value 0.03359
scoring_system epss
scoring_elements 0.87292
published_at 2026-04-01T12:55:00Z
2
value 0.03359
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-11T12:55:00Z
3
value 0.03359
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-12T12:55:00Z
4
value 0.03359
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-02T12:55:00Z
5
value 0.03359
scoring_system epss
scoring_elements 0.87318
published_at 2026-04-04T12:55:00Z
6
value 0.03359
scoring_system epss
scoring_elements 0.87317
published_at 2026-04-07T12:55:00Z
7
value 0.03359
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-08T12:55:00Z
8
value 0.03359
scoring_system epss
scoring_elements 0.87343
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1555
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1023121
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1023121
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
9
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
10
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
11
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
12
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
13
reference_url http://secunia.com/advisories/60306
reference_id
reference_type
scores
url http://secunia.com/advisories/60306
14
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
15
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
16
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
17
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
18
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
19
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-61.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-61.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
21
reference_url http://www.securityfocus.com/bid/68814
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68814
22
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
23
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121476
reference_id 1121476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121476
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1555
reference_id CVE-2014-1555
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1555
46
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-61
reference_id mfsa2014-61
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-61
48
reference_url https://access.redhat.com/errata/RHSA-2014:0918
reference_id RHSA-2014:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0918
49
reference_url https://access.redhat.com/errata/RHSA-2014:0919
reference_id RHSA-2014:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0919
50
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
51
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1555
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kway-xy2z-5fak
92
url VCID-m5p4-q6ru-jbhr
vulnerability_id VCID-m5p4-q6ru-jbhr
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1477
reference_id
reference_type
scores
0
value 0.00852
scoring_system epss
scoring_elements 0.74906
published_at 2026-04-13T12:55:00Z
1
value 0.00852
scoring_system epss
scoring_elements 0.74865
published_at 2026-04-01T12:55:00Z
2
value 0.00852
scoring_system epss
scoring_elements 0.74866
published_at 2026-04-02T12:55:00Z
3
value 0.00852
scoring_system epss
scoring_elements 0.74894
published_at 2026-04-04T12:55:00Z
4
value 0.00852
scoring_system epss
scoring_elements 0.74868
published_at 2026-04-07T12:55:00Z
5
value 0.00852
scoring_system epss
scoring_elements 0.74901
published_at 2026-04-08T12:55:00Z
6
value 0.00852
scoring_system epss
scoring_elements 0.74914
published_at 2026-04-09T12:55:00Z
7
value 0.00852
scoring_system epss
scoring_elements 0.74937
published_at 2026-04-11T12:55:00Z
8
value 0.00852
scoring_system epss
scoring_elements 0.74915
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1477
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060938
reference_id 1060938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060938
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
reference_id mfsa2014-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1477
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5p4-q6ru-jbhr
93
url VCID-m6b2-ap8v-e7gz
vulnerability_id VCID-m6b2-ap8v-e7gz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5610
reference_id
reference_type
scores
0
value 0.00881
scoring_system epss
scoring_elements 0.75361
published_at 2026-04-13T12:55:00Z
1
value 0.00881
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-01T12:55:00Z
2
value 0.00881
scoring_system epss
scoring_elements 0.75311
published_at 2026-04-02T12:55:00Z
3
value 0.00881
scoring_system epss
scoring_elements 0.75344
published_at 2026-04-04T12:55:00Z
4
value 0.00881
scoring_system epss
scoring_elements 0.75321
published_at 2026-04-07T12:55:00Z
5
value 0.00881
scoring_system epss
scoring_elements 0.75365
published_at 2026-04-08T12:55:00Z
6
value 0.00881
scoring_system epss
scoring_elements 0.75375
published_at 2026-04-09T12:55:00Z
7
value 0.00881
scoring_system epss
scoring_elements 0.75395
published_at 2026-04-11T12:55:00Z
8
value 0.00881
scoring_system epss
scoring_elements 0.75373
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5610
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039418
reference_id 1039418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039418
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610
reference_id CVE-2013-5610
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
reference_id mfsa2013-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5610
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6b2-ap8v-e7gz
94
url VCID-m7a7-kcdr-pkcr
vulnerability_id VCID-m7a7-kcdr-pkcr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1565
reference_id
reference_type
scores
0
value 0.00796
scoring_system epss
scoring_elements 0.73985
published_at 2026-04-13T12:55:00Z
1
value 0.00796
scoring_system epss
scoring_elements 0.73936
published_at 2026-04-01T12:55:00Z
2
value 0.00796
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-11T12:55:00Z
3
value 0.00796
scoring_system epss
scoring_elements 0.73993
published_at 2026-04-12T12:55:00Z
4
value 0.00796
scoring_system epss
scoring_elements 0.73944
published_at 2026-04-02T12:55:00Z
5
value 0.00796
scoring_system epss
scoring_elements 0.73969
published_at 2026-04-04T12:55:00Z
6
value 0.00796
scoring_system epss
scoring_elements 0.7394
published_at 2026-04-07T12:55:00Z
7
value 0.00796
scoring_system epss
scoring_elements 0.73974
published_at 2026-04-08T12:55:00Z
8
value 0.00796
scoring_system epss
scoring_elements 0.73988
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1565
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1047831
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1047831
7
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
8
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-70.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-70.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/69521
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69521
12
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
13
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135868
reference_id 1135868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135868
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565
reference_id CVE-2014-1565
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1565
reference_id CVE-2014-1565
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1565
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-70
reference_id mfsa2014-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-70
23
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
24
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1565
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7a7-kcdr-pkcr
95
url VCID-mg9v-rjps-9kgm
vulnerability_id VCID-mg9v-rjps-9kgm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1524
reference_id
reference_type
scores
0
value 0.06412
scoring_system epss
scoring_elements 0.91048
published_at 2026-04-13T12:55:00Z
1
value 0.06412
scoring_system epss
scoring_elements 0.90997
published_at 2026-04-01T12:55:00Z
2
value 0.06412
scoring_system epss
scoring_elements 0.91002
published_at 2026-04-02T12:55:00Z
3
value 0.06412
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-04T12:55:00Z
4
value 0.06412
scoring_system epss
scoring_elements 0.91021
published_at 2026-04-07T12:55:00Z
5
value 0.06412
scoring_system epss
scoring_elements 0.91034
published_at 2026-04-08T12:55:00Z
6
value 0.06412
scoring_system epss
scoring_elements 0.9104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092663
reference_id 1092663
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092663
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-38
reference_id mfsa2014-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-38
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1524
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg9v-rjps-9kgm
96
url VCID-mv8e-2ttb-5ua8
vulnerability_id VCID-mv8e-2ttb-5ua8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
4
reference_url http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1564
reference_id
reference_type
scores
0
value 0.14285
scoring_system epss
scoring_elements 0.94399
published_at 2026-04-13T12:55:00Z
1
value 0.14285
scoring_system epss
scoring_elements 0.94362
published_at 2026-04-01T12:55:00Z
2
value 0.14285
scoring_system epss
scoring_elements 0.94395
published_at 2026-04-09T12:55:00Z
3
value 0.14285
scoring_system epss
scoring_elements 0.94398
published_at 2026-04-12T12:55:00Z
4
value 0.14285
scoring_system epss
scoring_elements 0.9437
published_at 2026-04-02T12:55:00Z
5
value 0.14285
scoring_system epss
scoring_elements 0.94381
published_at 2026-04-07T12:55:00Z
6
value 0.14285
scoring_system epss
scoring_elements 0.94391
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1564
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1045977
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1045977
8
reference_url http://seclists.org/fulldisclosure/2014/Sep/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Sep/18
9
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
10
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
11
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-69.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-69.html
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.securityfocus.com/archive/1/533357/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533357/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/69525
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69525
15
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
16
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135865
reference_id 1135865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135865
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564
reference_id CVE-2014-1564
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1564
reference_id CVE-2014-1564
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1564
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js
reference_id CVE-2014-1564;OSVDB-110716
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js
28
reference_url https://www.securityfocus.com/bid/69525/info
reference_id CVE-2014-1564;OSVDB-110716
reference_type exploit
scores
url https://www.securityfocus.com/bid/69525/info
29
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-69
reference_id mfsa2014-69
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-69
31
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
32
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1564
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv8e-2ttb-5ua8
97
url VCID-nbqt-kaag-pkcw
vulnerability_id VCID-nbqt-kaag-pkcw
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5597
reference_id
reference_type
scores
0
value 0.03629
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-13T12:55:00Z
1
value 0.03629
scoring_system epss
scoring_elements 0.87772
published_at 2026-04-01T12:55:00Z
2
value 0.03629
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-02T12:55:00Z
3
value 0.03629
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-04T12:55:00Z
4
value 0.03629
scoring_system epss
scoring_elements 0.87798
published_at 2026-04-07T12:55:00Z
5
value 0.03629
scoring_system epss
scoring_elements 0.87819
published_at 2026-04-08T12:55:00Z
6
value 0.03629
scoring_system epss
scoring_elements 0.87826
published_at 2026-04-09T12:55:00Z
7
value 0.03629
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-11T12:55:00Z
8
value 0.03629
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023841
reference_id 1023841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023841
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-98
reference_id mfsa2013-98
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-98
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5597
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbqt-kaag-pkcw
98
url VCID-p45t-mhpe-4ufg
vulnerability_id VCID-p45t-mhpe-4ufg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1534
reference_id
reference_type
scores
0
value 0.02679
scoring_system epss
scoring_elements 0.85839
published_at 2026-04-13T12:55:00Z
1
value 0.02679
scoring_system epss
scoring_elements 0.85766
published_at 2026-04-01T12:55:00Z
2
value 0.02679
scoring_system epss
scoring_elements 0.85846
published_at 2026-04-11T12:55:00Z
3
value 0.02679
scoring_system epss
scoring_elements 0.85843
published_at 2026-04-12T12:55:00Z
4
value 0.02679
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-02T12:55:00Z
5
value 0.02679
scoring_system epss
scoring_elements 0.85797
published_at 2026-04-04T12:55:00Z
6
value 0.02679
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-07T12:55:00Z
7
value 0.02679
scoring_system epss
scoring_elements 0.85821
published_at 2026-04-08T12:55:00Z
8
value 0.02679
scoring_system epss
scoring_elements 0.85831
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1534
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1000598
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1000598
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1000960
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1000960
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1002340
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1002340
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1005578
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1005578
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1007223
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1007223
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=969517
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=969517
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=969549
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=969549
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=973874
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=973874
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=978652
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=978652
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=990868
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=990868
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995816
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995816
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995817
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995817
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=996536
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=996536
20
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
21
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
22
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
23
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
24
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
25
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
26
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
27
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
28
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-48.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-48.html
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.securityfocus.com/bid/67964
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67964
31
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
32
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
33
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107403
reference_id 1107403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107403
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534
reference_id CVE-2014-1534
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1534
reference_id CVE-2014-1534
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1534
38
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-48
reference_id mfsa2014-48
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-48
40
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1534
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p45t-mhpe-4ufg
99
url VCID-pbjx-qyn8-s7bt
vulnerability_id VCID-pbjx-qyn8-s7bt
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json
6
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1583
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73057
published_at 2026-04-13T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73004
published_at 2026-04-01T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73084
published_at 2026-04-11T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73063
published_at 2026-04-12T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73013
published_at 2026-04-02T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.73034
published_at 2026-04-04T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73009
published_at 2026-04-07T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.73046
published_at 2026-04-08T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73059
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1583
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1015540
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1015540
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
17
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
18
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
19
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
20
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
21
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-82.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-82.html
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
23
reference_url http://www.securityfocus.com/bid/70424
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70424
24
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
25
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
26
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152683
reference_id 1152683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152683
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1583
reference_id CVE-2014-1583
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1583
33
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-82
reference_id mfsa2014-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-82
35
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
36
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1583
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjx-qyn8-s7bt
100
url VCID-pnba-jmy3-2yfa
vulnerability_id VCID-pnba-jmy3-2yfa
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8632
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43274
published_at 2026-04-13T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43212
published_at 2026-04-01T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43321
published_at 2026-04-11T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43289
published_at 2026-04-12T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43268
published_at 2026-04-02T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43297
published_at 2026-04-04T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43234
published_at 2026-04-07T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43286
published_at 2026-04-08T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.433
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8632
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169211
reference_id 1169211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169211
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632
reference_id CVE-2014-8632
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8632
reference_id CVE-2014-8632
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-8632
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-91
reference_id mfsa2014-91
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-91
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8632
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnba-jmy3-2yfa
101
url VCID-ptkt-s26b-q7hu
vulnerability_id VCID-ptkt-s26b-q7hu
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8631
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44264
published_at 2026-04-13T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44198
published_at 2026-04-01T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44278
published_at 2026-04-09T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44296
published_at 2026-04-11T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44266
published_at 2026-04-02T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44288
published_at 2026-04-04T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44221
published_at 2026-04-07T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44273
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8631
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=821573
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=821573
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169211
reference_id 1169211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169211
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631
reference_id CVE-2014-8631
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8631
reference_id CVE-2014-8631
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-8631
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-91
reference_id mfsa2014-91
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-91
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8631
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkt-s26b-q7hu
102
url VCID-qdev-8m9n-8bbr
vulnerability_id VCID-qdev-8m9n-8bbr
summary security update
references
0
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
1
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
2
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
3
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1307.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1307.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1354.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1354.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1371.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1371.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
reference_id
reference_type
scores
0
value 0.30935
scoring_system epss
scoring_elements 0.96737
published_at 2026-04-13T12:55:00Z
1
value 0.30935
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-07T12:55:00Z
2
value 0.30935
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-08T12:55:00Z
3
value 0.30935
scoring_system epss
scoring_elements 0.96731
published_at 2026-04-09T12:55:00Z
4
value 0.30935
scoring_system epss
scoring_elements 0.96734
published_at 2026-04-12T12:55:00Z
5
value 0.30935
scoring_system epss
scoring_elements 0.96718
published_at 2026-04-04T12:55:00Z
6
value 0.34437
scoring_system epss
scoring_elements 0.96962
published_at 2026-04-01T12:55:00Z
7
value 0.34437
scoring_system epss
scoring_elements 0.9697
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
15
reference_url http://secunia.com/advisories/61540
reference_id
reference_type
scores
url http://secunia.com/advisories/61540
16
reference_url http://secunia.com/advisories/61574
reference_id
reference_type
scores
url http://secunia.com/advisories/61574
17
reference_url http://secunia.com/advisories/61575
reference_id
reference_type
scores
url http://secunia.com/advisories/61575
18
reference_url http://secunia.com/advisories/61576
reference_id
reference_type
scores
url http://secunia.com/advisories/61576
19
reference_url http://secunia.com/advisories/61583
reference_id
reference_type
scores
url http://secunia.com/advisories/61583
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
21
reference_url http://www.debian.org/security/2014/dsa-3033
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3033
22
reference_url http://www.debian.org/security/2014/dsa-3034
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3034
23
reference_url http://www.debian.org/security/2014/dsa-3037
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3037
24
reference_url http://www.kb.cert.org/vuls/id/772676
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/772676
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
26
reference_url http://www.novell.com/support/kb/doc.php?id=7015701
reference_id
reference_type
scores
url http://www.novell.com/support/kb/doc.php?id=7015701
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
29
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
31
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
32
reference_url http://www.securityfocus.com/bid/70116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70116
33
reference_url http://www.ubuntu.com/usn/USN-2360-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-1
34
reference_url http://www.ubuntu.com/usn/USN-2360-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-2
35
reference_url http://www.ubuntu.com/usn/USN-2361-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2361-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
reference_id 1145429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
reference_id CVE-2014-1568
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
270
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
271
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
reference_id mfsa2014-73
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
272
reference_url https://access.redhat.com/errata/RHSA-2014:1307
reference_id RHSA-2014:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1307
273
reference_url https://access.redhat.com/errata/RHSA-2014:1354
reference_id RHSA-2014:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1354
274
reference_url https://access.redhat.com/errata/RHSA-2014:1371
reference_id RHSA-2014:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1371
275
reference_url https://usn.ubuntu.com/2360-1/
reference_id USN-2360-1
reference_type
scores
url https://usn.ubuntu.com/2360-1/
276
reference_url https://usn.ubuntu.com/2360-2/
reference_id USN-2360-2
reference_type
scores
url https://usn.ubuntu.com/2360-2/
277
reference_url https://usn.ubuntu.com/2361-1/
reference_id USN-2361-1
reference_type
scores
url https://usn.ubuntu.com/2361-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1568
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr
103
url VCID-qdqz-admy-e7cg
vulnerability_id VCID-qdqz-admy-e7cg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
reference_id
reference_type
scores
0
value 0.00528
scoring_system epss
scoring_elements 0.67166
published_at 2026-04-13T12:55:00Z
1
value 0.00528
scoring_system epss
scoring_elements 0.67093
published_at 2026-04-01T12:55:00Z
2
value 0.00528
scoring_system epss
scoring_elements 0.6713
published_at 2026-04-02T12:55:00Z
3
value 0.00528
scoring_system epss
scoring_elements 0.67153
published_at 2026-04-04T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67128
published_at 2026-04-07T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67178
published_at 2026-04-08T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67191
published_at 2026-04-09T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.6721
published_at 2026-04-11T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67196
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
reference_id 1060955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
14
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
16
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
17
reference_url https://access.redhat.com/errata/RHSA-2014:0979
reference_id RHSA-2014:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0979
18
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
19
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
20
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqz-admy-e7cg
104
url VCID-qpzb-b3nx-m3cv
vulnerability_id VCID-qpzb-b3nx-m3cv
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1591
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.5066
published_at 2026-04-13T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.5057
published_at 2026-04-01T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50698
published_at 2026-04-11T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50675
published_at 2026-04-12T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50622
published_at 2026-04-02T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50649
published_at 2026-04-04T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50604
published_at 2026-04-07T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50659
published_at 2026-04-08T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50655
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1591
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169207
reference_id 1169207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169207
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591
reference_id CVE-2014-1591
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1591
reference_id CVE-2014-1591
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1591
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-86
reference_id mfsa2014-86
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-86
12
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1591
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv
105
url VCID-r1ju-8ww8-yygz
vulnerability_id VCID-r1ju-8ww8-yygz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8637
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65533
published_at 2026-04-13T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.6545
published_at 2026-04-01T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65499
published_at 2026-04-02T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65527
published_at 2026-04-04T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65491
published_at 2026-04-07T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.65544
published_at 2026-04-08T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65555
published_at 2026-04-09T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65574
published_at 2026-04-11T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65561
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8637
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180964
reference_id 1180964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180964
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637
reference_id CVE-2014-8637
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-02
reference_id mfsa2015-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-02
6
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8637
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ju-8ww8-yygz
106
url VCID-r39h-25hq-gbdz
vulnerability_id VCID-r39h-25hq-gbdz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0828
reference_id
reference_type
scores
0
value 0.01358
scoring_system epss
scoring_elements 0.8014
published_at 2026-04-13T12:55:00Z
1
value 0.01358
scoring_system epss
scoring_elements 0.80095
published_at 2026-04-01T12:55:00Z
2
value 0.01358
scoring_system epss
scoring_elements 0.80102
published_at 2026-04-02T12:55:00Z
3
value 0.01358
scoring_system epss
scoring_elements 0.80122
published_at 2026-04-04T12:55:00Z
4
value 0.01358
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-07T12:55:00Z
5
value 0.01358
scoring_system epss
scoring_elements 0.80139
published_at 2026-04-08T12:55:00Z
6
value 0.01358
scoring_system epss
scoring_elements 0.80145
published_at 2026-04-09T12:55:00Z
7
value 0.01358
scoring_system epss
scoring_elements 0.80164
published_at 2026-04-11T12:55:00Z
8
value 0.01358
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0828
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195621
reference_id 1195621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195621
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828
reference_id CVE-2015-0828
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-18
reference_id mfsa2015-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-18
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0828
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz
107
url VCID-r56k-pzrk-kfbb
vulnerability_id VCID-r56k-pzrk-kfbb
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1577
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-13T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79581
published_at 2026-04-01T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79655
published_at 2026-04-11T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-12T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79588
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79611
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79598
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.79626
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1577
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
22
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
23
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
24
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
25
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
26
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
27
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
28
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
29
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
31
reference_url http://www.securityfocus.com/bid/70440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70440
32
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
33
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
34
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
35
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152359
reference_id 1152359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152359
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1577
reference_id CVE-2014-1577
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1577
44
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-76
reference_id mfsa2014-76
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-76
46
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
47
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
48
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
49
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1577
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb
108
url VCID-r5au-uh8y-2ub7
vulnerability_id VCID-r5au-uh8y-2ub7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1553
reference_id
reference_type
scores
0
value 0.00553
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-13T12:55:00Z
1
value 0.00553
scoring_system epss
scoring_elements 0.67973
published_at 2026-04-01T12:55:00Z
2
value 0.00553
scoring_system epss
scoring_elements 0.68082
published_at 2026-04-11T12:55:00Z
3
value 0.00553
scoring_system epss
scoring_elements 0.68068
published_at 2026-04-12T12:55:00Z
4
value 0.00553
scoring_system epss
scoring_elements 0.67995
published_at 2026-04-02T12:55:00Z
5
value 0.00553
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-04T12:55:00Z
6
value 0.00553
scoring_system epss
scoring_elements 0.67992
published_at 2026-04-07T12:55:00Z
7
value 0.00553
scoring_system epss
scoring_elements 0.68043
published_at 2026-04-08T12:55:00Z
8
value 0.00553
scoring_system epss
scoring_elements 0.68058
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1553
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1022945
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1022945
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1027359
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1027359
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1033121
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1033121
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1035007
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1035007
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1037666
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1037666
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1041148
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1041148
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995075
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995075
13
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
14
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
15
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
16
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
17
reference_url http://www.securityfocus.com/bid/69524
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69524
18
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
19
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135863
reference_id 1135863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135863
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553
reference_id CVE-2014-1553
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1553
reference_id CVE-2014-1553
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1553
30
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
reference_id mfsa2014-67
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
32
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
33
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1553
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5au-uh8y-2ub7
109
url VCID-r8f9-h598-7bg5
vulnerability_id VCID-r8f9-h598-7bg5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8641
reference_id
reference_type
scores
0
value 0.01522
scoring_system epss
scoring_elements 0.8126
published_at 2026-04-13T12:55:00Z
1
value 0.01522
scoring_system epss
scoring_elements 0.81197
published_at 2026-04-01T12:55:00Z
2
value 0.01522
scoring_system epss
scoring_elements 0.81205
published_at 2026-04-02T12:55:00Z
3
value 0.01522
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-07T12:55:00Z
4
value 0.01522
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-08T12:55:00Z
5
value 0.01522
scoring_system epss
scoring_elements 0.81261
published_at 2026-04-09T12:55:00Z
6
value 0.01522
scoring_system epss
scoring_elements 0.81282
published_at 2026-04-11T12:55:00Z
7
value 0.01522
scoring_system epss
scoring_elements 0.81268
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180973
reference_id 1180973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180973
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-06
reference_id mfsa2015-06
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-06
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8641
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5
110
url VCID-r9u9-r48j-qkgv
vulnerability_id VCID-r9u9-r48j-qkgv
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5599
reference_id
reference_type
scores
0
value 0.02688
scoring_system epss
scoring_elements 0.85861
published_at 2026-04-13T12:55:00Z
1
value 0.02688
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-01T12:55:00Z
2
value 0.02688
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-02T12:55:00Z
3
value 0.02688
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-04T12:55:00Z
4
value 0.02688
scoring_system epss
scoring_elements 0.85824
published_at 2026-04-07T12:55:00Z
5
value 0.02688
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-08T12:55:00Z
6
value 0.02688
scoring_system epss
scoring_elements 0.85853
published_at 2026-04-09T12:55:00Z
7
value 0.02688
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-11T12:55:00Z
8
value 0.02688
scoring_system epss
scoring_elements 0.85865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
reference_id 1023843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
reference_id mfsa2013-100
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5599
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9u9-r48j-qkgv
111
url VCID-rb29-1vnh-jbgw
vulnerability_id VCID-rb29-1vnh-jbgw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0818
reference_id
reference_type
scores
0
value 0.02087
scoring_system epss
scoring_elements 0.84013
published_at 2026-04-13T12:55:00Z
1
value 0.02087
scoring_system epss
scoring_elements 0.83945
published_at 2026-04-01T12:55:00Z
2
value 0.02087
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-02T12:55:00Z
3
value 0.02087
scoring_system epss
scoring_elements 0.83975
published_at 2026-04-04T12:55:00Z
4
value 0.02087
scoring_system epss
scoring_elements 0.83978
published_at 2026-04-07T12:55:00Z
5
value 0.02087
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-08T12:55:00Z
6
value 0.02087
scoring_system epss
scoring_elements 0.84008
published_at 2026-04-09T12:55:00Z
7
value 0.02087
scoring_system epss
scoring_elements 0.84024
published_at 2026-04-11T12:55:00Z
8
value 0.02087
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0818
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1204363
reference_id 1204363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1204363
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-28
reference_id mfsa2015-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-28
7
reference_url https://access.redhat.com/errata/RHSA-2015:0718
reference_id RHSA-2015:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0718
8
reference_url https://usn.ubuntu.com/2538-1/
reference_id USN-2538-1
reference_type
scores
url https://usn.ubuntu.com/2538-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0818
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rb29-1vnh-jbgw
112
url VCID-rcqe-r6h3-yua2
vulnerability_id VCID-rcqe-r6h3-yua2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1489
reference_id
reference_type
scores
0
value 0.01246
scoring_system epss
scoring_elements 0.79298
published_at 2026-04-13T12:55:00Z
1
value 0.01246
scoring_system epss
scoring_elements 0.7925
published_at 2026-04-01T12:55:00Z
2
value 0.01246
scoring_system epss
scoring_elements 0.79257
published_at 2026-04-02T12:55:00Z
3
value 0.01246
scoring_system epss
scoring_elements 0.7928
published_at 2026-04-04T12:55:00Z
4
value 0.01246
scoring_system epss
scoring_elements 0.79266
published_at 2026-04-07T12:55:00Z
5
value 0.01246
scoring_system epss
scoring_elements 0.79292
published_at 2026-04-08T12:55:00Z
6
value 0.01246
scoring_system epss
scoring_elements 0.79301
published_at 2026-04-09T12:55:00Z
7
value 0.01246
scoring_system epss
scoring_elements 0.79325
published_at 2026-04-11T12:55:00Z
8
value 0.01246
scoring_system epss
scoring_elements 0.79309
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1489
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060948
reference_id 1060948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060948
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489
reference_id CVE-2014-1489
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-10
reference_id mfsa2014-10
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-10
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1489
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcqe-r6h3-yua2
113
url VCID-rf6c-27qw-afh8
vulnerability_id VCID-rf6c-27qw-afh8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1532
reference_id
reference_type
scores
0
value 0.04891
scoring_system epss
scoring_elements 0.89587
published_at 2026-04-13T12:55:00Z
1
value 0.04891
scoring_system epss
scoring_elements 0.89549
published_at 2026-04-01T12:55:00Z
2
value 0.04891
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-02T12:55:00Z
3
value 0.04891
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-04T12:55:00Z
4
value 0.04891
scoring_system epss
scoring_elements 0.89566
published_at 2026-04-07T12:55:00Z
5
value 0.04891
scoring_system epss
scoring_elements 0.89583
published_at 2026-04-08T12:55:00Z
6
value 0.04891
scoring_system epss
scoring_elements 0.89588
published_at 2026-04-09T12:55:00Z
7
value 0.04891
scoring_system epss
scoring_elements 0.89595
published_at 2026-04-11T12:55:00Z
8
value 0.04891
scoring_system epss
scoring_elements 0.89594
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092670
reference_id 1092670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092670
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-46
reference_id mfsa2014-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-46
12
reference_url https://access.redhat.com/errata/RHSA-2014:0448
reference_id RHSA-2014:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0448
13
reference_url https://access.redhat.com/errata/RHSA-2014:0449
reference_id RHSA-2014:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0449
14
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
15
reference_url https://usn.ubuntu.com/2189-1/
reference_id USN-2189-1
reference_type
scores
url https://usn.ubuntu.com/2189-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1532
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf6c-27qw-afh8
114
url VCID-rq2s-6pv9-tyee
vulnerability_id VCID-rq2s-6pv9-tyee
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0835
reference_id
reference_type
scores
0
value 0.01508
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-13T12:55:00Z
1
value 0.01508
scoring_system epss
scoring_elements 0.8112
published_at 2026-04-01T12:55:00Z
2
value 0.01508
scoring_system epss
scoring_elements 0.81128
published_at 2026-04-02T12:55:00Z
3
value 0.01508
scoring_system epss
scoring_elements 0.81152
published_at 2026-04-07T12:55:00Z
4
value 0.01508
scoring_system epss
scoring_elements 0.8118
published_at 2026-04-08T12:55:00Z
5
value 0.01508
scoring_system epss
scoring_elements 0.81185
published_at 2026-04-09T12:55:00Z
6
value 0.01508
scoring_system epss
scoring_elements 0.81205
published_at 2026-04-11T12:55:00Z
7
value 0.01508
scoring_system epss
scoring_elements 0.81191
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0835
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195609
reference_id 1195609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195609
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835
reference_id CVE-2015-0835
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
reference_id mfsa2015-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0835
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rq2s-6pv9-tyee
115
url VCID-smdh-r7xw-pkc5
vulnerability_id VCID-smdh-r7xw-pkc5
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1586
reference_id
reference_type
scores
0
value 0.00695
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-13T12:55:00Z
1
value 0.00695
scoring_system epss
scoring_elements 0.71868
published_at 2026-04-01T12:55:00Z
2
value 0.00695
scoring_system epss
scoring_elements 0.7194
published_at 2026-04-11T12:55:00Z
3
value 0.00695
scoring_system epss
scoring_elements 0.71923
published_at 2026-04-12T12:55:00Z
4
value 0.00695
scoring_system epss
scoring_elements 0.71876
published_at 2026-04-02T12:55:00Z
5
value 0.00695
scoring_system epss
scoring_elements 0.71895
published_at 2026-04-04T12:55:00Z
6
value 0.00695
scoring_system epss
scoring_elements 0.71867
published_at 2026-04-07T12:55:00Z
7
value 0.00695
scoring_system epss
scoring_elements 0.71905
published_at 2026-04-08T12:55:00Z
8
value 0.00695
scoring_system epss
scoring_elements 0.71917
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1586
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1062981
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1062981
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
19
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
20
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
21
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
22
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
23
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
24
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
27
reference_url http://www.securityfocus.com/bid/70427
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70427
28
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
29
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
30
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
31
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152366
reference_id 1152366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152366
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1586
reference_id CVE-2014-1586
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1586
40
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-81
reference_id mfsa2014-81
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-81
42
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
43
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1586
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smdh-r7xw-pkc5
116
url VCID-sme4-gu3c-kkf3
vulnerability_id VCID-sme4-gu3c-kkf3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8636
reference_id
reference_type
scores
0
value 0.83612
scoring_system epss
scoring_elements 0.99287
published_at 2026-04-13T12:55:00Z
1
value 0.83612
scoring_system epss
scoring_elements 0.99278
published_at 2026-04-01T12:55:00Z
2
value 0.83612
scoring_system epss
scoring_elements 0.99279
published_at 2026-04-02T12:55:00Z
3
value 0.83612
scoring_system epss
scoring_elements 0.99281
published_at 2026-04-04T12:55:00Z
4
value 0.83612
scoring_system epss
scoring_elements 0.99284
published_at 2026-04-07T12:55:00Z
5
value 0.83612
scoring_system epss
scoring_elements 0.99285
published_at 2026-04-08T12:55:00Z
6
value 0.83612
scoring_system epss
scoring_elements 0.99286
published_at 2026-04-11T12:55:00Z
7
value 0.83612
scoring_system epss
scoring_elements 0.99288
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8636
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180977
reference_id 1180977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180977
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636
reference_id CVE-2014-8636
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb
reference_id CVE-2014-8636;OSVDB-117005
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-09
reference_id mfsa2015-09
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-09
7
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8636
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sme4-gu3c-kkf3
117
url VCID-snqg-4mwy-tyee
vulnerability_id VCID-snqg-4mwy-tyee
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1562
reference_id
reference_type
scores
0
value 0.01266
scoring_system epss
scoring_elements 0.79459
published_at 2026-04-13T12:55:00Z
1
value 0.01266
scoring_system epss
scoring_elements 0.79411
published_at 2026-04-01T12:55:00Z
2
value 0.01266
scoring_system epss
scoring_elements 0.79486
published_at 2026-04-11T12:55:00Z
3
value 0.01266
scoring_system epss
scoring_elements 0.79469
published_at 2026-04-12T12:55:00Z
4
value 0.01266
scoring_system epss
scoring_elements 0.79418
published_at 2026-04-02T12:55:00Z
5
value 0.01266
scoring_system epss
scoring_elements 0.79441
published_at 2026-04-04T12:55:00Z
6
value 0.01266
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-07T12:55:00Z
7
value 0.01266
scoring_system epss
scoring_elements 0.79456
published_at 2026-04-08T12:55:00Z
8
value 0.01266
scoring_system epss
scoring_elements 0.79464
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1562
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1054359
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1054359
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
12
reference_url http://secunia.com/advisories/60148
reference_id
reference_type
scores
url http://secunia.com/advisories/60148
13
reference_url http://secunia.com/advisories/60186
reference_id
reference_type
scores
url http://secunia.com/advisories/60186
14
reference_url http://secunia.com/advisories/61114
reference_id
reference_type
scores
url http://secunia.com/advisories/61114
15
reference_url http://secunia.com/advisories/61390
reference_id
reference_type
scores
url http://secunia.com/advisories/61390
16
reference_url http://www.debian.org/security/2014/dsa-3018
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3018
17
reference_url http://www.debian.org/security/2014/dsa-3028
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3028
18
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
20
reference_url http://www.securityfocus.com/bid/69519
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69519
21
reference_url http://www.securitytracker.com/id/1030793
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030793
22
reference_url http://www.securitytracker.com/id/1030794
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030794
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135862
reference_id 1135862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135862
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1562
reference_id CVE-2014-1562
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1562
50
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
reference_id mfsa2014-67
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-67
52
reference_url https://access.redhat.com/errata/RHSA-2014:1144
reference_id RHSA-2014:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1144
53
reference_url https://access.redhat.com/errata/RHSA-2014:1145
reference_id RHSA-2014:1145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1145
54
reference_url https://usn.ubuntu.com/2329-1/
reference_id USN-2329-1
reference_type
scores
url https://usn.ubuntu.com/2329-1/
55
reference_url https://usn.ubuntu.com/2330-1/
reference_id USN-2330-1
reference_type
scores
url https://usn.ubuntu.com/2330-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1562
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snqg-4mwy-tyee
118
url VCID-sxdy-axwk-8qeu
vulnerability_id VCID-sxdy-axwk-8qeu
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1566
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70274
published_at 2026-04-13T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.70211
published_at 2026-04-01T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-11T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-12T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70223
published_at 2026-04-02T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.7024
published_at 2026-04-04T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70217
published_at 2026-04-07T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70263
published_at 2026-04-08T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1566
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1050690
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1050690
2
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-71.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-71.html
3
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
4
reference_url http://www.securityfocus.com/bid/69522
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69522
5
reference_url http://www.securitytracker.com/id/1030792
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030792
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566
reference_id CVE-2014-1566
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1566
reference_id CVE-2014-1566
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1566
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-71
reference_id mfsa2014-71
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-71
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1566
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxdy-axwk-8qeu
119
url VCID-tayx-jncr-qkc5
vulnerability_id VCID-tayx-jncr-qkc5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1548
reference_id
reference_type
scores
0
value 0.03199
scoring_system epss
scoring_elements 0.86996
published_at 2026-04-13T12:55:00Z
1
value 0.03199
scoring_system epss
scoring_elements 0.86946
published_at 2026-04-01T12:55:00Z
2
value 0.03199
scoring_system epss
scoring_elements 0.87007
published_at 2026-04-11T12:55:00Z
3
value 0.03199
scoring_system epss
scoring_elements 0.87002
published_at 2026-04-12T12:55:00Z
4
value 0.03199
scoring_system epss
scoring_elements 0.86956
published_at 2026-04-02T12:55:00Z
5
value 0.03199
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-04T12:55:00Z
6
value 0.03199
scoring_system epss
scoring_elements 0.86967
published_at 2026-04-07T12:55:00Z
7
value 0.03199
scoring_system epss
scoring_elements 0.86987
published_at 2026-04-08T12:55:00Z
8
value 0.03199
scoring_system epss
scoring_elements 0.86994
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1548
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1002702
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1002702
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1009675
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1009675
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1013056
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1013056
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020008
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020008
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020041
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020041
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020219
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020219
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1021240
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1021240
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1021312
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1021312
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1021969
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1021969
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1022773
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1022773
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1028358
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1028358
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1034383
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1034383
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1035438
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1035438
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=990096
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=990096
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=994444
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=994444
17
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
18
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
19
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
20
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
21
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
22
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-56.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-56.html
23
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
24
reference_url http://www.securityfocus.com/bid/68818
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68818
25
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
26
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121469
reference_id 1121469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121469
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548
reference_id CVE-2014-1548
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1548
reference_id CVE-2014-1548
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1548
41
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-56
reference_id mfsa2014-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-56
43
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1548
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tayx-jncr-qkc5
120
url VCID-tbmc-kpsc-ukhj
vulnerability_id VCID-tbmc-kpsc-ukhj
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5600
reference_id
reference_type
scores
0
value 0.02688
scoring_system epss
scoring_elements 0.85861
published_at 2026-04-13T12:55:00Z
1
value 0.02688
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-01T12:55:00Z
2
value 0.02688
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-02T12:55:00Z
3
value 0.02688
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-04T12:55:00Z
4
value 0.02688
scoring_system epss
scoring_elements 0.85824
published_at 2026-04-07T12:55:00Z
5
value 0.02688
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-08T12:55:00Z
6
value 0.02688
scoring_system epss
scoring_elements 0.85853
published_at 2026-04-09T12:55:00Z
7
value 0.02688
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-11T12:55:00Z
8
value 0.02688
scoring_system epss
scoring_elements 0.85865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
reference_id 1023843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023843
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
reference_id mfsa2013-100
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-100
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5600
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbmc-kpsc-ukhj
121
url VCID-tjdk-a9k7-8fe4
vulnerability_id VCID-tjdk-a9k7-8fe4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1499
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.69783
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.69721
published_at 2026-04-01T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69733
published_at 2026-04-02T12:55:00Z
3
value 0.00611
scoring_system epss
scoring_elements 0.69749
published_at 2026-04-04T12:55:00Z
4
value 0.00611
scoring_system epss
scoring_elements 0.69726
published_at 2026-04-07T12:55:00Z
5
value 0.00611
scoring_system epss
scoring_elements 0.69774
published_at 2026-04-08T12:55:00Z
6
value 0.00611
scoring_system epss
scoring_elements 0.69789
published_at 2026-04-09T12:55:00Z
7
value 0.00611
scoring_system epss
scoring_elements 0.69812
published_at 2026-04-11T12:55:00Z
8
value 0.00611
scoring_system epss
scoring_elements 0.69798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1499
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077019
reference_id 1077019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077019
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499
reference_id CVE-2014-1499
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-19
reference_id mfsa2014-19
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-19
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1499
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjdk-a9k7-8fe4
122
url VCID-u9bh-bnz3-8kbq
vulnerability_id VCID-u9bh-bnz3-8kbq
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1512
reference_id
reference_type
scores
0
value 0.12933
scoring_system epss
scoring_elements 0.94063
published_at 2026-04-13T12:55:00Z
1
value 0.12933
scoring_system epss
scoring_elements 0.94023
published_at 2026-04-01T12:55:00Z
2
value 0.12933
scoring_system epss
scoring_elements 0.94033
published_at 2026-04-02T12:55:00Z
3
value 0.12933
scoring_system epss
scoring_elements 0.94043
published_at 2026-04-04T12:55:00Z
4
value 0.12933
scoring_system epss
scoring_elements 0.94046
published_at 2026-04-07T12:55:00Z
5
value 0.12933
scoring_system epss
scoring_elements 0.94055
published_at 2026-04-08T12:55:00Z
6
value 0.12933
scoring_system epss
scoring_elements 0.94059
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077491
reference_id 1077491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077491
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-30
reference_id mfsa2014-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-30
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1512
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bh-bnz3-8kbq
123
url VCID-ucnp-qr6h-gyg9
vulnerability_id VCID-ucnp-qr6h-gyg9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1502
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51758
published_at 2026-04-13T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51659
published_at 2026-04-01T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.5171
published_at 2026-04-02T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51735
published_at 2026-04-04T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51695
published_at 2026-04-07T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.5175
published_at 2026-04-08T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51746
published_at 2026-04-09T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51796
published_at 2026-04-11T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1502
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077021
reference_id 1077021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077021
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502
reference_id CVE-2014-1502
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-22
reference_id mfsa2014-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-22
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1502
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucnp-qr6h-gyg9
124
url VCID-v81u-gbpt-xqae
vulnerability_id VCID-v81u-gbpt-xqae
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1519
reference_id
reference_type
scores
0
value 0.02191
scoring_system epss
scoring_elements 0.84386
published_at 2026-04-13T12:55:00Z
1
value 0.02191
scoring_system epss
scoring_elements 0.84315
published_at 2026-04-01T12:55:00Z
2
value 0.02191
scoring_system epss
scoring_elements 0.84329
published_at 2026-04-02T12:55:00Z
3
value 0.02191
scoring_system epss
scoring_elements 0.8435
published_at 2026-04-04T12:55:00Z
4
value 0.02191
scoring_system epss
scoring_elements 0.84352
published_at 2026-04-07T12:55:00Z
5
value 0.02191
scoring_system epss
scoring_elements 0.84374
published_at 2026-04-08T12:55:00Z
6
value 0.02191
scoring_system epss
scoring_elements 0.84379
published_at 2026-04-09T12:55:00Z
7
value 0.02191
scoring_system epss
scoring_elements 0.84397
published_at 2026-04-11T12:55:00Z
8
value 0.02191
scoring_system epss
scoring_elements 0.8439
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1519
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519
reference_id CVE-2014-1519
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-34
reference_id mfsa2014-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-34
4
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1519
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v81u-gbpt-xqae
125
url VCID-vakw-28yu-9qhy
vulnerability_id VCID-vakw-28yu-9qhy
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1481
reference_id
reference_type
scores
0
value 0.02581
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-13T12:55:00Z
1
value 0.02581
scoring_system epss
scoring_elements 0.85494
published_at 2026-04-01T12:55:00Z
2
value 0.02581
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-02T12:55:00Z
3
value 0.02581
scoring_system epss
scoring_elements 0.85523
published_at 2026-04-04T12:55:00Z
4
value 0.02581
scoring_system epss
scoring_elements 0.85528
published_at 2026-04-07T12:55:00Z
5
value 0.02581
scoring_system epss
scoring_elements 0.85548
published_at 2026-04-08T12:55:00Z
6
value 0.02581
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-09T12:55:00Z
7
value 0.02581
scoring_system epss
scoring_elements 0.85573
published_at 2026-04-11T12:55:00Z
8
value 0.02581
scoring_system epss
scoring_elements 0.8557
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1481
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060952
reference_id 1060952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060952
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-13
reference_id mfsa2014-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-13
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1481
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vakw-28yu-9qhy
126
url VCID-vc55-3zmr-u3bp
vulnerability_id VCID-vc55-3zmr-u3bp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1584
reference_id
reference_type
scores
0
value 0.00682
scoring_system epss
scoring_elements 0.71608
published_at 2026-04-13T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-01T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71643
published_at 2026-04-11T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71627
published_at 2026-04-12T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71578
published_at 2026-04-02T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71596
published_at 2026-04-04T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71569
published_at 2026-04-07T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71609
published_at 2026-04-08T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.7162
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1584
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1066190
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1066190
7
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
8
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/70434
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70434
12
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
13
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152364
reference_id 1152364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152364
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584
reference_id CVE-2014-1584
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1584
reference_id CVE-2014-1584
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1584
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-80
reference_id mfsa2014-80
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-80
23
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1584
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vc55-3zmr-u3bp
127
url VCID-vd9t-a74z-v7e9
vulnerability_id VCID-vd9t-a74z-v7e9
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5602
reference_id
reference_type
scores
0
value 0.03229
scoring_system epss
scoring_elements 0.87066
published_at 2026-04-13T12:55:00Z
1
value 0.03229
scoring_system epss
scoring_elements 0.87013
published_at 2026-04-01T12:55:00Z
2
value 0.03229
scoring_system epss
scoring_elements 0.87025
published_at 2026-04-02T12:55:00Z
3
value 0.03229
scoring_system epss
scoring_elements 0.87043
published_at 2026-04-04T12:55:00Z
4
value 0.03229
scoring_system epss
scoring_elements 0.87036
published_at 2026-04-07T12:55:00Z
5
value 0.03229
scoring_system epss
scoring_elements 0.87056
published_at 2026-04-08T12:55:00Z
6
value 0.03229
scoring_system epss
scoring_elements 0.87064
published_at 2026-04-09T12:55:00Z
7
value 0.03229
scoring_system epss
scoring_elements 0.87077
published_at 2026-04-11T12:55:00Z
8
value 0.03229
scoring_system epss
scoring_elements 0.87071
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023844
reference_id 1023844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023844
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-101
reference_id mfsa2013-101
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-101
13
reference_url https://access.redhat.com/errata/RHSA-2013:1476
reference_id RHSA-2013:1476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1476
14
reference_url https://access.redhat.com/errata/RHSA-2013:1480
reference_id RHSA-2013:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1480
15
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
16
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5602
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vd9t-a74z-v7e9
128
url VCID-vg52-dyxw-4kes
vulnerability_id VCID-vg52-dyxw-4kes
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1479
reference_id
reference_type
scores
0
value 0.01468
scoring_system epss
scoring_elements 0.80905
published_at 2026-04-13T12:55:00Z
1
value 0.01468
scoring_system epss
scoring_elements 0.80847
published_at 2026-04-01T12:55:00Z
2
value 0.01468
scoring_system epss
scoring_elements 0.80855
published_at 2026-04-02T12:55:00Z
3
value 0.01468
scoring_system epss
scoring_elements 0.80878
published_at 2026-04-04T12:55:00Z
4
value 0.01468
scoring_system epss
scoring_elements 0.80875
published_at 2026-04-07T12:55:00Z
5
value 0.01468
scoring_system epss
scoring_elements 0.80903
published_at 2026-04-08T12:55:00Z
6
value 0.01468
scoring_system epss
scoring_elements 0.80912
published_at 2026-04-09T12:55:00Z
7
value 0.01468
scoring_system epss
scoring_elements 0.80928
published_at 2026-04-11T12:55:00Z
8
value 0.01468
scoring_system epss
scoring_elements 0.80914
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060940
reference_id 1060940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060940
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-02
reference_id mfsa2014-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-02
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1479
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg52-dyxw-4kes
129
url VCID-vg9h-jcc1-9qeg
vulnerability_id VCID-vg9h-jcc1-9qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
reference_id
reference_type
scores
0
value 0.02752
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-13T12:55:00Z
1
value 0.02752
scoring_system epss
scoring_elements 0.85941
published_at 2026-04-01T12:55:00Z
2
value 0.02752
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-02T12:55:00Z
3
value 0.02752
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-04T12:55:00Z
4
value 0.02752
scoring_system epss
scoring_elements 0.85967
published_at 2026-04-07T12:55:00Z
5
value 0.02752
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-08T12:55:00Z
6
value 0.02752
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-09T12:55:00Z
7
value 0.02752
scoring_system epss
scoring_elements 0.8601
published_at 2026-04-11T12:55:00Z
8
value 0.02752
scoring_system epss
scoring_elements 0.86008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
reference_id 1039417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
reference_id CVE-2013-5609
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
reference_id mfsa2013-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5609
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg
130
url VCID-vhpz-366r-hbg1
vulnerability_id VCID-vhpz-366r-hbg1
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1590
reference_id
reference_type
scores
0
value 0.01019
scoring_system epss
scoring_elements 0.77209
published_at 2026-04-13T12:55:00Z
1
value 0.01019
scoring_system epss
scoring_elements 0.77147
published_at 2026-04-01T12:55:00Z
2
value 0.01019
scoring_system epss
scoring_elements 0.77234
published_at 2026-04-11T12:55:00Z
3
value 0.01019
scoring_system epss
scoring_elements 0.77213
published_at 2026-04-12T12:55:00Z
4
value 0.01019
scoring_system epss
scoring_elements 0.77154
published_at 2026-04-02T12:55:00Z
5
value 0.01019
scoring_system epss
scoring_elements 0.77183
published_at 2026-04-04T12:55:00Z
6
value 0.01019
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-07T12:55:00Z
7
value 0.01019
scoring_system epss
scoring_elements 0.77198
published_at 2026-04-08T12:55:00Z
8
value 0.01019
scoring_system epss
scoring_elements 0.77206
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1590
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71397
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71397
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169206
reference_id 1169206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169206
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1590
reference_id CVE-2014-1590
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1590
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-85
reference_id mfsa2014-85
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-85
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1590
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1
131
url VCID-vhq8-wmxx-wqgt
vulnerability_id VCID-vhq8-wmxx-wqgt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51227
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51278
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51303
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51263
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51318
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51315
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51358
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
reference_id 1039421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
reference_id CVE-2013-5614
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
reference_id mfsa2013-107
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5614
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt
132
url VCID-vjt1-8bvw-d7dp
vulnerability_id VCID-vjt1-8bvw-d7dp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0820
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56746
published_at 2026-04-13T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56632
published_at 2026-04-01T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56727
published_at 2026-04-02T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56748
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56725
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-08T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56782
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.5679
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56767
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0820
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820
reference_id CVE-2015-0820
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-27
reference_id mfsa2015-27
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-27
4
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0820
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp
133
url VCID-vw8m-869a-c7gn
vulnerability_id VCID-vw8m-869a-c7gn
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1497
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66025
published_at 2026-04-13T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-01T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.65992
published_at 2026-04-02T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.6602
published_at 2026-04-04T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-07T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66037
published_at 2026-04-08T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66049
published_at 2026-04-09T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66068
published_at 2026-04-11T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66055
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077016
reference_id 1077016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077016
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-17
reference_id mfsa2014-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-17
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1497
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw8m-869a-c7gn
134
url VCID-w5wp-ujx1-vkhp
vulnerability_id VCID-w5wp-ujx1-vkhp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
reference_id
reference_type
scores
0
value 0.01956
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-13T12:55:00Z
1
value 0.01956
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-01T12:55:00Z
2
value 0.01956
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-11T12:55:00Z
3
value 0.01956
scoring_system epss
scoring_elements 0.83485
published_at 2026-04-12T12:55:00Z
4
value 0.01956
scoring_system epss
scoring_elements 0.83429
published_at 2026-04-02T12:55:00Z
5
value 0.01956
scoring_system epss
scoring_elements 0.83443
published_at 2026-04-04T12:55:00Z
6
value 0.01956
scoring_system epss
scoring_elements 0.83442
published_at 2026-04-07T12:55:00Z
7
value 0.01956
scoring_system epss
scoring_elements 0.83467
published_at 2026-04-08T12:55:00Z
8
value 0.01956
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
8
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
9
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
10
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
11
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
12
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
13
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
14
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
15
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
16
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
17
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
18
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
19
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
20
reference_url http://www.securityfocus.com/bid/68816
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68816
21
reference_url http://www.securitytracker.com/id/1030617
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030617
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
reference_id 1116198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
reference_id CVE-2014-1544
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
95
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
96
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
reference_id mfsa2014-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
97
reference_url https://access.redhat.com/errata/RHSA-2014:0915
reference_id RHSA-2014:0915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0915
98
reference_url https://access.redhat.com/errata/RHSA-2014:0916
reference_id RHSA-2014:0916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0916
99
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
100
reference_url https://access.redhat.com/errata/RHSA-2014:1165
reference_id RHSA-2014:1165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1165
101
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
102
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
103
reference_url https://usn.ubuntu.com/2343-1/
reference_id USN-2343-1
reference_type
scores
url https://usn.ubuntu.com/2343-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1544
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5wp-ujx1-vkhp
135
url VCID-w63q-84j6-h7dk
vulnerability_id VCID-w63q-84j6-h7dk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0830
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76255
published_at 2026-04-13T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76192
published_at 2026-04-01T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76198
published_at 2026-04-02T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.7623
published_at 2026-04-04T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.7621
published_at 2026-04-07T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76242
published_at 2026-04-08T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76256
published_at 2026-04-09T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76282
published_at 2026-04-11T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76259
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0830
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195613
reference_id 1195613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195613
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830
reference_id CVE-2015-0830
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-14
reference_id mfsa2015-14
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-14
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0830
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk
136
url VCID-wauk-j6s7-hugt
vulnerability_id VCID-wauk-j6s7-hugt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1550
reference_id
reference_type
scores
0
value 0.03758
scoring_system epss
scoring_elements 0.88037
published_at 2026-04-13T12:55:00Z
1
value 0.03758
scoring_system epss
scoring_elements 0.87978
published_at 2026-04-01T12:55:00Z
2
value 0.03758
scoring_system epss
scoring_elements 0.88044
published_at 2026-04-11T12:55:00Z
3
value 0.03758
scoring_system epss
scoring_elements 0.88036
published_at 2026-04-12T12:55:00Z
4
value 0.03758
scoring_system epss
scoring_elements 0.87988
published_at 2026-04-02T12:55:00Z
5
value 0.03758
scoring_system epss
scoring_elements 0.88002
published_at 2026-04-04T12:55:00Z
6
value 0.03758
scoring_system epss
scoring_elements 0.88007
published_at 2026-04-07T12:55:00Z
7
value 0.03758
scoring_system epss
scoring_elements 0.88027
published_at 2026-04-08T12:55:00Z
8
value 0.03758
scoring_system epss
scoring_elements 0.88034
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1550
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1020411
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1020411
3
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
4
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
5
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-58.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-58.html
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
7
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
8
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121472
reference_id 1121472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121472
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550
reference_id CVE-2014-1550
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1550
reference_id CVE-2014-1550
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1550
23
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-58
reference_id mfsa2014-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-58
25
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
26
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1550
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wauk-j6s7-hugt
137
url VCID-wkfm-csjp-v7bx
vulnerability_id VCID-wkfm-csjp-v7bx
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2566
reference_id
reference_type
scores
0
value 0.90757
scoring_system epss
scoring_elements 0.99622
published_at 2026-04-01T12:55:00Z
1
value 0.90757
scoring_system epss
scoring_elements 0.99621
published_at 2026-04-02T12:55:00Z
2
value 0.90757
scoring_system epss
scoring_elements 0.99623
published_at 2026-04-04T12:55:00Z
3
value 0.90757
scoring_system epss
scoring_elements 0.99624
published_at 2026-04-11T12:55:00Z
4
value 0.90757
scoring_system epss
scoring_elements 0.99625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2566
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=921947
reference_id 921947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=921947
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
reference_id CVE-2013-2566
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
8
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-2566
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkfm-csjp-v7bx
138
url VCID-ws75-69mb-ryc7
vulnerability_id VCID-ws75-69mb-ryc7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1494
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.68129
published_at 2026-04-13T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.68067
published_at 2026-04-01T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68089
published_at 2026-04-02T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68108
published_at 2026-04-04T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-07T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68136
published_at 2026-04-08T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.68151
published_at 2026-04-09T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68176
published_at 2026-04-11T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68162
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1494
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077014
reference_id 1077014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077014
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494
reference_id CVE-2014-1494
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-15
reference_id mfsa2014-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-15
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1494
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws75-69mb-ryc7
139
url VCID-x8t2-vbc7-e3a6
vulnerability_id VCID-x8t2-vbc7-e3a6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1488
reference_id
reference_type
scores
0
value 0.01089
scoring_system epss
scoring_elements 0.77927
published_at 2026-04-13T12:55:00Z
1
value 0.01089
scoring_system epss
scoring_elements 0.7787
published_at 2026-04-01T12:55:00Z
2
value 0.01089
scoring_system epss
scoring_elements 0.77877
published_at 2026-04-02T12:55:00Z
3
value 0.01089
scoring_system epss
scoring_elements 0.77905
published_at 2026-04-04T12:55:00Z
4
value 0.01089
scoring_system epss
scoring_elements 0.77886
published_at 2026-04-07T12:55:00Z
5
value 0.01089
scoring_system epss
scoring_elements 0.77913
published_at 2026-04-08T12:55:00Z
6
value 0.01089
scoring_system epss
scoring_elements 0.77918
published_at 2026-04-09T12:55:00Z
7
value 0.01089
scoring_system epss
scoring_elements 0.77944
published_at 2026-04-11T12:55:00Z
8
value 0.01089
scoring_system epss
scoring_elements 0.77928
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1488
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060949
reference_id 1060949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060949
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488
reference_id CVE-2014-1488
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-11
reference_id mfsa2014-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-11
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1488
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8t2-vbc7-e3a6
140
url VCID-x99v-uyfe-w3ft
vulnerability_id VCID-x99v-uyfe-w3ft
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1478
reference_id
reference_type
scores
0
value 0.01231
scoring_system epss
scoring_elements 0.79179
published_at 2026-04-12T12:55:00Z
1
value 0.01231
scoring_system epss
scoring_elements 0.79121
published_at 2026-04-01T12:55:00Z
2
value 0.01231
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-02T12:55:00Z
3
value 0.01231
scoring_system epss
scoring_elements 0.79153
published_at 2026-04-04T12:55:00Z
4
value 0.01231
scoring_system epss
scoring_elements 0.79138
published_at 2026-04-07T12:55:00Z
5
value 0.01231
scoring_system epss
scoring_elements 0.79162
published_at 2026-04-08T12:55:00Z
6
value 0.01231
scoring_system epss
scoring_elements 0.7917
published_at 2026-04-13T12:55:00Z
7
value 0.01231
scoring_system epss
scoring_elements 0.79195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060939
reference_id 1060939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060939
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478
reference_id CVE-2014-1478
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
reference_id mfsa2014-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-01
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1478
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x99v-uyfe-w3ft
141
url VCID-xbab-79ux-t3bn
vulnerability_id VCID-xbab-79ux-t3bn
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html
2
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5369
reference_id
reference_type
scores
0
value 0.00582
scoring_system epss
scoring_elements 0.68924
published_at 2026-04-13T12:55:00Z
1
value 0.00582
scoring_system epss
scoring_elements 0.68857
published_at 2026-04-01T12:55:00Z
2
value 0.00582
scoring_system epss
scoring_elements 0.68875
published_at 2026-04-02T12:55:00Z
3
value 0.00582
scoring_system epss
scoring_elements 0.68895
published_at 2026-04-04T12:55:00Z
4
value 0.00582
scoring_system epss
scoring_elements 0.68876
published_at 2026-04-07T12:55:00Z
5
value 0.00582
scoring_system epss
scoring_elements 0.68926
published_at 2026-04-08T12:55:00Z
6
value 0.00582
scoring_system epss
scoring_elements 0.68945
published_at 2026-04-09T12:55:00Z
7
value 0.00582
scoring_system epss
scoring_elements 0.68968
published_at 2026-04-11T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.68953
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369
5
reference_url http://secunia.com/advisories/60779
reference_id
reference_type
scores
url http://secunia.com/advisories/60779
6
reference_url http://secunia.com/advisories/60887
reference_id
reference_type
scores
url http://secunia.com/advisories/60887
7
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
8
reference_url http://sourceforge.net/p/enigmail/bugs/294/
reference_id
reference_type
scores
url http://sourceforge.net/p/enigmail/bugs/294/
9
reference_url http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/
reference_id
reference_type
scores
url http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/
10
reference_url http://www.openwall.com/lists/oss-security/2014/08/18/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/18/2
11
reference_url http://www.openwall.com/lists/oss-security/2014/08/22/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/22/1
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5369
reference_id CVE-2014-5369
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5369
15
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-5369
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbab-79ux-t3bn
142
url VCID-xkrc-t2jn-dqfb
vulnerability_id VCID-xkrc-t2jn-dqfb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1504
reference_id
reference_type
scores
0
value 0.00606
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-13T12:55:00Z
1
value 0.00606
scoring_system epss
scoring_elements 0.69555
published_at 2026-04-01T12:55:00Z
2
value 0.00606
scoring_system epss
scoring_elements 0.69567
published_at 2026-04-02T12:55:00Z
3
value 0.00606
scoring_system epss
scoring_elements 0.69583
published_at 2026-04-04T12:55:00Z
4
value 0.00606
scoring_system epss
scoring_elements 0.69562
published_at 2026-04-07T12:55:00Z
5
value 0.00606
scoring_system epss
scoring_elements 0.69612
published_at 2026-04-08T12:55:00Z
6
value 0.00606
scoring_system epss
scoring_elements 0.69629
published_at 2026-04-09T12:55:00Z
7
value 0.00606
scoring_system epss
scoring_elements 0.69652
published_at 2026-04-11T12:55:00Z
8
value 0.00606
scoring_system epss
scoring_elements 0.69637
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1504
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077022
reference_id 1077022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504
reference_id CVE-2014-1504
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-23
reference_id mfsa2014-23
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-23
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1504
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xkrc-t2jn-dqfb
143
url VCID-xqqq-rk53-ubhp
vulnerability_id VCID-xqqq-rk53-ubhp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0833
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16149
published_at 2026-04-13T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16256
published_at 2026-04-11T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16216
published_at 2026-04-12T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1608
published_at 2026-04-01T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16264
published_at 2026-04-02T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16325
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16123
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16208
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16275
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0833
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833
reference_id CVE-2015-0833
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-12
reference_id mfsa2015-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-12
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-58
reference_id mfsa2015-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-58
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0833
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp
144
url VCID-xqv7-v1pk-p3f9
vulnerability_id VCID-xqv7-v1pk-p3f9
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1486
reference_id
reference_type
scores
0
value 0.10821
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-13T12:55:00Z
1
value 0.10821
scoring_system epss
scoring_elements 0.93329
published_at 2026-04-01T12:55:00Z
2
value 0.10821
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-02T12:55:00Z
3
value 0.10821
scoring_system epss
scoring_elements 0.93344
published_at 2026-04-04T12:55:00Z
4
value 0.10821
scoring_system epss
scoring_elements 0.93343
published_at 2026-04-07T12:55:00Z
5
value 0.10821
scoring_system epss
scoring_elements 0.93351
published_at 2026-04-08T12:55:00Z
6
value 0.10821
scoring_system epss
scoring_elements 0.93356
published_at 2026-04-09T12:55:00Z
7
value 0.10821
scoring_system epss
scoring_elements 0.9336
published_at 2026-04-11T12:55:00Z
8
value 0.10821
scoring_system epss
scoring_elements 0.93358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1486
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060945
reference_id 1060945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060945
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-08
reference_id mfsa2014-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-08
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1486
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqv7-v1pk-p3f9
145
url VCID-xs3q-48t9-1qgn
vulnerability_id VCID-xs3q-48t9-1qgn
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1580
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63897
published_at 2026-04-13T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63818
published_at 2026-04-01T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63944
published_at 2026-04-11T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.6393
published_at 2026-04-12T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63879
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63906
published_at 2026-04-04T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-07T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63914
published_at 2026-04-08T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63931
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1580
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
7
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
8
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/70431
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70431
12
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
13
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152362
reference_id 1152362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152362
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580
reference_id CVE-2014-1580
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1580
reference_id CVE-2014-1580
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1580
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-78
reference_id mfsa2014-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-78
23
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1580
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn
146
url VCID-xy7m-y1mb-n3bv
vulnerability_id VCID-xy7m-y1mb-n3bv
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0918.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0918.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1547
reference_id
reference_type
scores
0
value 0.02205
scoring_system epss
scoring_elements 0.84444
published_at 2026-04-13T12:55:00Z
1
value 0.02205
scoring_system epss
scoring_elements 0.84371
published_at 2026-04-01T12:55:00Z
2
value 0.02205
scoring_system epss
scoring_elements 0.84454
published_at 2026-04-11T12:55:00Z
3
value 0.02205
scoring_system epss
scoring_elements 0.84448
published_at 2026-04-12T12:55:00Z
4
value 0.02205
scoring_system epss
scoring_elements 0.84385
published_at 2026-04-02T12:55:00Z
5
value 0.02205
scoring_system epss
scoring_elements 0.84406
published_at 2026-04-04T12:55:00Z
6
value 0.02205
scoring_system epss
scoring_elements 0.84408
published_at 2026-04-07T12:55:00Z
7
value 0.02205
scoring_system epss
scoring_elements 0.8443
published_at 2026-04-08T12:55:00Z
8
value 0.02205
scoring_system epss
scoring_elements 0.84435
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1547
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1012694
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1012694
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1019684
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1019684
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1024765
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1024765
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=985070
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=985070
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
12
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
13
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
14
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
15
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
16
reference_url http://secunia.com/advisories/60306
reference_id
reference_type
scores
url http://secunia.com/advisories/60306
17
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
18
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
19
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
20
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
21
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
22
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-56.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-56.html
23
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
24
reference_url http://www.securityfocus.com/bid/68811
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68811
25
reference_url http://www.securitytracker.com/id/1030619
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030619
26
reference_url http://www.securitytracker.com/id/1030620
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030620
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121464
reference_id 1121464
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121464
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1547
reference_id CVE-2014-1547
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1547
49
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-56
reference_id mfsa2014-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-56
51
reference_url https://access.redhat.com/errata/RHSA-2014:0918
reference_id RHSA-2014:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0918
52
reference_url https://access.redhat.com/errata/RHSA-2014:0919
reference_id RHSA-2014:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0919
53
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
54
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1547
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xy7m-y1mb-n3bv
147
url VCID-xymx-1zrp-syg3
vulnerability_id VCID-xymx-1zrp-syg3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1485
reference_id
reference_type
scores
0
value 0.00964
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-12T12:55:00Z
1
value 0.00964
scoring_system epss
scoring_elements 0.76485
published_at 2026-04-01T12:55:00Z
2
value 0.00964
scoring_system epss
scoring_elements 0.76489
published_at 2026-04-02T12:55:00Z
3
value 0.00964
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-04T12:55:00Z
4
value 0.00964
scoring_system epss
scoring_elements 0.765
published_at 2026-04-07T12:55:00Z
5
value 0.00964
scoring_system epss
scoring_elements 0.76533
published_at 2026-04-08T12:55:00Z
6
value 0.00964
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-13T12:55:00Z
7
value 0.00964
scoring_system epss
scoring_elements 0.7657
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1485
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060944
reference_id 1060944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060944
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485
reference_id CVE-2014-1485
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-07
reference_id mfsa2014-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-07
6
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1485
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xymx-1zrp-syg3
148
url VCID-y2tp-wrva-hkc5
vulnerability_id VCID-y2tp-wrva-hkc5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1582
reference_id
reference_type
scores
0
value 0.00879
scoring_system epss
scoring_elements 0.7534
published_at 2026-04-13T12:55:00Z
1
value 0.00879
scoring_system epss
scoring_elements 0.75285
published_at 2026-04-01T12:55:00Z
2
value 0.00879
scoring_system epss
scoring_elements 0.75373
published_at 2026-04-11T12:55:00Z
3
value 0.00879
scoring_system epss
scoring_elements 0.75351
published_at 2026-04-12T12:55:00Z
4
value 0.00879
scoring_system epss
scoring_elements 0.75289
published_at 2026-04-02T12:55:00Z
5
value 0.00879
scoring_system epss
scoring_elements 0.75321
published_at 2026-04-04T12:55:00Z
6
value 0.00879
scoring_system epss
scoring_elements 0.75299
published_at 2026-04-07T12:55:00Z
7
value 0.00879
scoring_system epss
scoring_elements 0.75342
published_at 2026-04-08T12:55:00Z
8
value 0.00879
scoring_system epss
scoring_elements 0.75352
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1582
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1049095
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1049095
7
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
8
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/70432
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70432
12
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
13
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152364
reference_id 1152364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152364
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582
reference_id CVE-2014-1582
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1582
reference_id CVE-2014-1582
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1582
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-80
reference_id mfsa2014-80
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-80
23
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1582
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2tp-wrva-hkc5
149
url VCID-y3b2-26sv-97a5
vulnerability_id VCID-y3b2-26sv-97a5
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1487
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69744
published_at 2026-04-13T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69679
published_at 2026-04-01T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69691
published_at 2026-04-02T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69708
published_at 2026-04-04T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.69685
published_at 2026-04-07T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69735
published_at 2026-04-08T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.69752
published_at 2026-04-09T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69773
published_at 2026-04-11T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69758
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060947
reference_id 1060947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060947
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-09
reference_id mfsa2014-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-09
13
reference_url https://access.redhat.com/errata/RHSA-2014:0132
reference_id RHSA-2014:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0132
14
reference_url https://access.redhat.com/errata/RHSA-2014:0133
reference_id RHSA-2014:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0133
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1487
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3b2-26sv-97a5
150
url VCID-y9mj-mmex-vbeu
vulnerability_id VCID-y9mj-mmex-vbeu
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5593
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65192
published_at 2026-04-13T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65111
published_at 2026-04-01T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65161
published_at 2026-04-02T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-04T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65152
published_at 2026-04-07T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65202
published_at 2026-04-08T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65214
published_at 2026-04-09T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-11T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.6522
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5593
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023836
reference_id 1023836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023836
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593
reference_id CVE-2013-5593
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-94
reference_id mfsa2013-94
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-94
6
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
7
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5593
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9mj-mmex-vbeu
151
url VCID-yau8-zmtt-1ke1
vulnerability_id VCID-yau8-zmtt-1ke1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5592
reference_id
reference_type
scores
0
value 0.02659
scoring_system epss
scoring_elements 0.85785
published_at 2026-04-13T12:55:00Z
1
value 0.02659
scoring_system epss
scoring_elements 0.85711
published_at 2026-04-01T12:55:00Z
2
value 0.02659
scoring_system epss
scoring_elements 0.85723
published_at 2026-04-02T12:55:00Z
3
value 0.02659
scoring_system epss
scoring_elements 0.85742
published_at 2026-04-04T12:55:00Z
4
value 0.02659
scoring_system epss
scoring_elements 0.85748
published_at 2026-04-07T12:55:00Z
5
value 0.02659
scoring_system epss
scoring_elements 0.85767
published_at 2026-04-08T12:55:00Z
6
value 0.02659
scoring_system epss
scoring_elements 0.85777
published_at 2026-04-09T12:55:00Z
7
value 0.02659
scoring_system epss
scoring_elements 0.85792
published_at 2026-04-11T12:55:00Z
8
value 0.02659
scoring_system epss
scoring_elements 0.85788
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5592
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592
reference_id CVE-2013-5592
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
reference_id mfsa2013-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
4
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5592
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yau8-zmtt-1ke1
152
url VCID-ydrd-xcq5-67aj
vulnerability_id VCID-ydrd-xcq5-67aj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1496
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-13T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.198
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19947
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20004
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19731
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19864
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19874
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19829
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1496
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077015
reference_id 1077015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077015
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496
reference_id CVE-2014-1496
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-16
reference_id mfsa2014-16
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-16
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1496
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrd-xcq5-67aj
153
url VCID-ypmc-2484-3fev
vulnerability_id VCID-ypmc-2484-3fev
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1498
reference_id
reference_type
scores
0
value 0.00548
scoring_system epss
scoring_elements 0.67907
published_at 2026-04-13T12:55:00Z
1
value 0.00548
scoring_system epss
scoring_elements 0.67845
published_at 2026-04-01T12:55:00Z
2
value 0.00548
scoring_system epss
scoring_elements 0.67869
published_at 2026-04-07T12:55:00Z
3
value 0.00548
scoring_system epss
scoring_elements 0.67888
published_at 2026-04-04T12:55:00Z
4
value 0.00548
scoring_system epss
scoring_elements 0.67919
published_at 2026-04-08T12:55:00Z
5
value 0.00548
scoring_system epss
scoring_elements 0.67933
published_at 2026-04-09T12:55:00Z
6
value 0.00548
scoring_system epss
scoring_elements 0.67956
published_at 2026-04-11T12:55:00Z
7
value 0.00548
scoring_system epss
scoring_elements 0.67943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1498
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077018
reference_id 1077018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077018
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498
reference_id CVE-2014-1498
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-18
reference_id mfsa2014-18
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-18
6
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1498
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmc-2484-3fev
154
url VCID-yu2w-6fdx-93aq
vulnerability_id VCID-yu2w-6fdx-93aq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8635
reference_id
reference_type
scores
0
value 0.01644
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-13T12:55:00Z
1
value 0.01644
scoring_system epss
scoring_elements 0.81896
published_at 2026-04-01T12:55:00Z
2
value 0.01644
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-02T12:55:00Z
3
value 0.01644
scoring_system epss
scoring_elements 0.8193
published_at 2026-04-04T12:55:00Z
4
value 0.01644
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-07T12:55:00Z
5
value 0.01644
scoring_system epss
scoring_elements 0.81953
published_at 2026-04-08T12:55:00Z
6
value 0.01644
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-09T12:55:00Z
7
value 0.01644
scoring_system epss
scoring_elements 0.8198
published_at 2026-04-11T12:55:00Z
8
value 0.01644
scoring_system epss
scoring_elements 0.81969
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8635
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180963
reference_id 1180963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180963
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635
reference_id CVE-2014-8635
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
reference_id mfsa2015-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
6
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-8635
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu2w-6fdx-93aq
155
url VCID-yujw-37a2-h7b9
vulnerability_id VCID-yujw-37a2-h7b9
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0741.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0741.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0742.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0742.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-0741.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0741.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-0742.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0742.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1533
reference_id
reference_type
scores
0
value 0.03197
scoring_system epss
scoring_elements 0.86992
published_at 2026-04-13T12:55:00Z
1
value 0.03197
scoring_system epss
scoring_elements 0.86942
published_at 2026-04-01T12:55:00Z
2
value 0.03197
scoring_system epss
scoring_elements 0.87003
published_at 2026-04-11T12:55:00Z
3
value 0.03197
scoring_system epss
scoring_elements 0.86998
published_at 2026-04-12T12:55:00Z
4
value 0.03197
scoring_system epss
scoring_elements 0.86952
published_at 2026-04-02T12:55:00Z
5
value 0.03197
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-04T12:55:00Z
6
value 0.03197
scoring_system epss
scoring_elements 0.86963
published_at 2026-04-07T12:55:00Z
7
value 0.03197
scoring_system epss
scoring_elements 0.86983
published_at 2026-04-08T12:55:00Z
8
value 0.03197
scoring_system epss
scoring_elements 0.8699
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1533
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1009952
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1009952
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1011007
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1011007
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=921622
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=921622
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=967354
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=967354
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=978811
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=978811
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=988719
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=988719
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=991981
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=991981
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=992274
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=992274
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=994907
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=994907
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=995679
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=995679
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=996715
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=996715
22
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=999651
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=999651
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
27
reference_url http://secunia.com/advisories/58984
reference_id
reference_type
scores
url http://secunia.com/advisories/58984
28
reference_url http://secunia.com/advisories/59052
reference_id
reference_type
scores
url http://secunia.com/advisories/59052
29
reference_url http://secunia.com/advisories/59149
reference_id
reference_type
scores
url http://secunia.com/advisories/59149
30
reference_url http://secunia.com/advisories/59150
reference_id
reference_type
scores
url http://secunia.com/advisories/59150
31
reference_url http://secunia.com/advisories/59165
reference_id
reference_type
scores
url http://secunia.com/advisories/59165
32
reference_url http://secunia.com/advisories/59169
reference_id
reference_type
scores
url http://secunia.com/advisories/59169
33
reference_url http://secunia.com/advisories/59170
reference_id
reference_type
scores
url http://secunia.com/advisories/59170
34
reference_url http://secunia.com/advisories/59171
reference_id
reference_type
scores
url http://secunia.com/advisories/59171
35
reference_url http://secunia.com/advisories/59229
reference_id
reference_type
scores
url http://secunia.com/advisories/59229
36
reference_url http://secunia.com/advisories/59275
reference_id
reference_type
scores
url http://secunia.com/advisories/59275
37
reference_url http://secunia.com/advisories/59328
reference_id
reference_type
scores
url http://secunia.com/advisories/59328
38
reference_url http://secunia.com/advisories/59377
reference_id
reference_type
scores
url http://secunia.com/advisories/59377
39
reference_url http://secunia.com/advisories/59387
reference_id
reference_type
scores
url http://secunia.com/advisories/59387
40
reference_url http://secunia.com/advisories/59425
reference_id
reference_type
scores
url http://secunia.com/advisories/59425
41
reference_url http://secunia.com/advisories/59486
reference_id
reference_type
scores
url http://secunia.com/advisories/59486
42
reference_url http://secunia.com/advisories/59866
reference_id
reference_type
scores
url http://secunia.com/advisories/59866
43
reference_url http://www.debian.org/security/2014/dsa-2955
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2955
44
reference_url http://www.debian.org/security/2014/dsa-2960
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2960
45
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-48.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-48.html
46
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
47
reference_url http://www.securityfocus.com/bid/67965
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/67965
48
reference_url http://www.securitytracker.com/id/1030386
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030386
49
reference_url http://www.securitytracker.com/id/1030388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030388
50
reference_url http://www.ubuntu.com/usn/USN-2243-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2243-1
51
reference_url http://www.ubuntu.com/usn/USN-2250-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2250-1
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1107399
reference_id 1107399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1107399
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1533
reference_id CVE-2014-1533
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1533
64
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
65
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-48
reference_id mfsa2014-48
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-48
66
reference_url https://access.redhat.com/errata/RHSA-2014:0741
reference_id RHSA-2014:0741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0741
67
reference_url https://access.redhat.com/errata/RHSA-2014:0742
reference_id RHSA-2014:0742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0742
68
reference_url https://usn.ubuntu.com/2243-1/
reference_id USN-2243-1
reference_type
scores
url https://usn.ubuntu.com/2243-1/
69
reference_url https://usn.ubuntu.com/2250-1/
reference_id USN-2250-1
reference_type
scores
url https://usn.ubuntu.com/2250-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1533
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yujw-37a2-h7b9
156
url VCID-yv1t-4nze-rqf6
vulnerability_id VCID-yv1t-4nze-rqf6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5615
reference_id
reference_type
scores
0
value 0.02013
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-13T12:55:00Z
1
value 0.02013
scoring_system epss
scoring_elements 0.83648
published_at 2026-04-01T12:55:00Z
2
value 0.02013
scoring_system epss
scoring_elements 0.83661
published_at 2026-04-02T12:55:00Z
3
value 0.02013
scoring_system epss
scoring_elements 0.83676
published_at 2026-04-04T12:55:00Z
4
value 0.02013
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-07T12:55:00Z
5
value 0.02013
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-08T12:55:00Z
6
value 0.02013
scoring_system epss
scoring_elements 0.83709
published_at 2026-04-09T12:55:00Z
7
value 0.02013
scoring_system epss
scoring_elements 0.83725
published_at 2026-04-11T12:55:00Z
8
value 0.02013
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5615
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039430
reference_id 1039430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039430
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615
reference_id CVE-2013-5615
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-115
reference_id mfsa2013-115
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-115
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
7
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2013-5615
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yv1t-4nze-rqf6
157
url VCID-za1s-65ue-nqdz
vulnerability_id VCID-za1s-65ue-nqdz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1585
reference_id
reference_type
scores
0
value 0.00695
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-13T12:55:00Z
1
value 0.00695
scoring_system epss
scoring_elements 0.71868
published_at 2026-04-01T12:55:00Z
2
value 0.00695
scoring_system epss
scoring_elements 0.7194
published_at 2026-04-11T12:55:00Z
3
value 0.00695
scoring_system epss
scoring_elements 0.71923
published_at 2026-04-12T12:55:00Z
4
value 0.00695
scoring_system epss
scoring_elements 0.71876
published_at 2026-04-02T12:55:00Z
5
value 0.00695
scoring_system epss
scoring_elements 0.71895
published_at 2026-04-04T12:55:00Z
6
value 0.00695
scoring_system epss
scoring_elements 0.71867
published_at 2026-04-07T12:55:00Z
7
value 0.00695
scoring_system epss
scoring_elements 0.71905
published_at 2026-04-08T12:55:00Z
8
value 0.00695
scoring_system epss
scoring_elements 0.71917
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1585
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1062876
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1062876
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
19
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
20
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
21
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
22
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
23
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
24
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
27
reference_url http://www.securityfocus.com/bid/70425
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70425
28
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
29
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
30
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
31
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152366
reference_id 1152366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152366
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1585
reference_id CVE-2014-1585
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1585
40
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-81
reference_id mfsa2014-81
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-81
42
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
43
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1585
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-za1s-65ue-nqdz
158
url VCID-zeyg-dbfj-93eg
vulnerability_id VCID-zeyg-dbfj-93eg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0829
reference_id
reference_type
scores
0
value 0.02182
scoring_system epss
scoring_elements 0.84359
published_at 2026-04-13T12:55:00Z
1
value 0.02182
scoring_system epss
scoring_elements 0.84291
published_at 2026-04-01T12:55:00Z
2
value 0.02182
scoring_system epss
scoring_elements 0.84304
published_at 2026-04-02T12:55:00Z
3
value 0.02182
scoring_system epss
scoring_elements 0.84324
published_at 2026-04-04T12:55:00Z
4
value 0.02182
scoring_system epss
scoring_elements 0.84326
published_at 2026-04-07T12:55:00Z
5
value 0.02182
scoring_system epss
scoring_elements 0.84347
published_at 2026-04-08T12:55:00Z
6
value 0.02182
scoring_system epss
scoring_elements 0.84352
published_at 2026-04-09T12:55:00Z
7
value 0.02182
scoring_system epss
scoring_elements 0.84371
published_at 2026-04-11T12:55:00Z
8
value 0.02182
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0829
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195620
reference_id 1195620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195620
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829
reference_id CVE-2015-0829
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-17
reference_id mfsa2015-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-17
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0829
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg
159
url VCID-zrvg-5xgk-cqc3
vulnerability_id VCID-zrvg-5xgk-cqc3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1514
reference_id
reference_type
scores
0
value 0.04165
scoring_system epss
scoring_elements 0.8869
published_at 2026-04-13T12:55:00Z
1
value 0.04165
scoring_system epss
scoring_elements 0.88634
published_at 2026-04-01T12:55:00Z
2
value 0.04165
scoring_system epss
scoring_elements 0.88643
published_at 2026-04-02T12:55:00Z
3
value 0.04165
scoring_system epss
scoring_elements 0.88659
published_at 2026-04-04T12:55:00Z
4
value 0.04165
scoring_system epss
scoring_elements 0.8866
published_at 2026-04-07T12:55:00Z
5
value 0.04165
scoring_system epss
scoring_elements 0.88678
published_at 2026-04-08T12:55:00Z
6
value 0.04165
scoring_system epss
scoring_elements 0.88684
published_at 2026-04-09T12:55:00Z
7
value 0.04165
scoring_system epss
scoring_elements 0.88696
published_at 2026-04-11T12:55:00Z
8
value 0.04165
scoring_system epss
scoring_elements 0.88689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1514
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077494
reference_id 1077494
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077494
13
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-32
reference_id mfsa2014-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-32
15
reference_url https://access.redhat.com/errata/RHSA-2014:0310
reference_id RHSA-2014:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0310
16
reference_url https://access.redhat.com/errata/RHSA-2014:0316
reference_id RHSA-2014:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0316
17
reference_url https://usn.ubuntu.com/2150-1/
reference_id USN-2150-1
reference_type
scores
url https://usn.ubuntu.com/2150-1/
18
reference_url https://usn.ubuntu.com/2151-1/
reference_id USN-2151-1
reference_type
scores
url https://usn.ubuntu.com/2151-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2014-1514
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrvg-5xgk-cqc3
160
url VCID-zxvq-vk4c-ebd9
vulnerability_id VCID-zxvq-vk4c-ebd9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0832
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30665
published_at 2026-04-13T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30663
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30796
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30843
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30662
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.3072
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30752
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30756
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30711
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0832
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195610
reference_id 1195610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195610
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832
reference_id CVE-2015-0832
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-13
reference_id mfsa2015-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-13
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
1
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
2
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
aliases CVE-2015-0832
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0