Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85544?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "type": "ebuild", "namespace": "www-client", "name": "seamonkey-bin", "version": "31.5.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "31.5.3", "latest_non_vulnerable_version": "31.5.3", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61190?format=api", "vulnerability_id": "VCID-18ut-jmww-bffq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87487", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.8749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87509", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87516", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03454", "scoring_system": "epss", "scoring_elements": "0.87523", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5591" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023846", "reference_id": "1023846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591", "reference_id": "CVE-2013-5591", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93", "reference_id": "mfsa2013-93", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5591" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18ut-jmww-bffq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54767?format=api", "vulnerability_id": "VCID-1ert-2qyc-cfc1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74523", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74525", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079851", "reference_id": "1079851", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079851" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-45", "reference_id": "mfsa2014-45", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-45" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0917", "reference_id": "RHSA-2014:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1073", "reference_id": "RHSA-2014:1073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1246", "reference_id": "RHSA-2014:1246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1246" }, { "reference_url": "https://usn.ubuntu.com/2159-1/", "reference_id": "USN-2159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2159-1/" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1492" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ert-2qyc-cfc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61222?format=api", "vulnerability_id": "VCID-1ntg-ddgs-tfhw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11552", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11721", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11652", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11663", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11626", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520", "reference_id": "CVE-2014-1520", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-35", "reference_id": "mfsa2014-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-35" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1520" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ntg-ddgs-tfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61254?format=api", "vulnerability_id": "VCID-1ytq-j1bc-cbg6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1560", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.6834", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1560" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=997795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=997795" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480", "reference_id": "1121480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560", "reference_id": "CVE-2014-1560", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1560", "reference_id": "CVE-2014-1560", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1560" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65", "reference_id": "mfsa2014-65", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1560" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ytq-j1bc-cbg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56694?format=api", "vulnerability_id": "VCID-24qn-29xp-93cr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80902", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80843", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.809", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80909", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80925", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80911", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013", "reference_id": "1077013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-15", "reference_id": "mfsa2014-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1493" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24qn-29xp-93cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55681?format=api", "vulnerability_id": "VCID-29gb-hk74-myfk", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.9137", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.9132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91342", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06864", "scoring_system": "epss", "scoring_elements": "0.91371", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023863", "reference_id": "1023863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023863" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-95", "reference_id": "mfsa2013-95", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-95" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5604" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29gb-hk74-myfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61194?format=api", "vulnerability_id": "VCID-2kyd-fwqg-qufp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.7369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73641", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.7365", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73647", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73699", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5598" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023842", "reference_id": "1023842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598", "reference_id": "CVE-2013-5598", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-99", "reference_id": "mfsa2013-99", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-99" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5598" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2kyd-fwqg-qufp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61224?format=api", "vulnerability_id": "VCID-2uha-ku3u-q3ac", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83059", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.82994", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83054", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.8307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01864", "scoring_system": "epss", "scoring_elements": "0.83064", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1525" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095070", "reference_id": "1095070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525", "reference_id": "CVE-2014-1525", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-39", "reference_id": "mfsa2014-39", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-39" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1525" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uha-ku3u-q3ac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55675?format=api", "vulnerability_id": "VCID-2yj1-m2c9-syfa", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.8556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85488", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85501", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85566", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02577", "scoring_system": "epss", "scoring_elements": "0.85564", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023839", "reference_id": "1023839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023839" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-96", "reference_id": "mfsa2013-96", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-96" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5595" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2yj1-m2c9-syfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61231?format=api", "vulnerability_id": "VCID-3cxj-t9e2-q3hj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89344", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.8939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04721", "scoring_system": "epss", "scoring_elements": "0.89384", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1542" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=991533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=991533" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-53.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-53.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67968" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107425", "reference_id": "1107425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107425" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542", "reference_id": "CVE-2014-1542", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1542", "reference_id": "CVE-2014-1542", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1542" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-53", "reference_id": "mfsa2014-53", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-53" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1542" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3cxj-t9e2-q3hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56935?format=api", "vulnerability_id": "VCID-3hsx-gtzg-duhf", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0918.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.7561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1556" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1028891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1028891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" }, { "reference_url": "http://secunia.com/advisories/59591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59591" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60306" }, { "reference_url": "http://secunia.com/advisories/60486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60486" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2986" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2996" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-62.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-62.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68822", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68822" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121478", "reference_id": "1121478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1556", "reference_id": "CVE-2014-1556", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1556" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-62", "reference_id": "mfsa2014-62", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-62" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0918", "reference_id": "RHSA-2014:0918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0919", "reference_id": "RHSA-2014:0919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0919" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1556" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hsx-gtzg-duhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61259?format=api", "vulnerability_id": "VCID-3n3r-1ucq-pye4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80661", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.8067", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0144", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1563" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018524" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-68.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69523", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69523" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135864", "reference_id": "1135864", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135864" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563", "reference_id": "CVE-2014-1563", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1563", "reference_id": "CVE-2014-1563", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1563" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-68", "reference_id": "mfsa2014-68", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-68" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1563" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3n3r-1ucq-pye4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61210?format=api", "vulnerability_id": "VCID-3vxn-zjpx-4ff5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51139", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51079", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51154", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1483" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060943", "reference_id": "1060943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483", "reference_id": "CVE-2014-1483", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-05", "reference_id": "mfsa2014-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-05" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1483" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vxn-zjpx-4ff5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61223?format=api", "vulnerability_id": "VCID-3vyb-n8e7-k7f7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73314", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73323", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.7332", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.7337", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73373", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1522" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095066", "reference_id": "1095066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522", "reference_id": "CVE-2014-1522", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-36", "reference_id": "mfsa2014-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-36" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1522" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vyb-n8e7-k7f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=api", "vulnerability_id": "VCID-45ek-y9nx-j3cd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83759", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619", "reference_id": "1195619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16", "reference_id": "mfsa2015-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0831" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56916?format=api", "vulnerability_id": "VCID-49hp-8pm6-vkhr", "summary": "security update", "references": [ { "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1545", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86314", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.8632", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86318", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86258", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86276", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86278", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02889", "scoring_system": "epss", "scoring_elements": "0.86306", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1545" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" }, { "reference_url": "http://secunia.com/advisories/58984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58984" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59275" }, { "reference_url": "http://secunia.com/advisories/59318", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59318" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59614", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59614" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2955" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2960", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2960" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2962" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/67975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67975" }, { "reference_url": "http://www.securitytracker.com/id/1030404", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030404" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2265-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2265-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432", "reference_id": "1107432", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1545", "reference_id": "CVE-2014-1545", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1545" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-55", "reference_id": "mfsa2014-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-55" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0917", "reference_id": "RHSA-2014:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1246", "reference_id": "RHSA-2014:1246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1246" }, { "reference_url": "https://usn.ubuntu.com/2265-1/", "reference_id": "USN-2265-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2265-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1545" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49hp-8pm6-vkhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61301?format=api", "vulnerability_id": "VCID-4dvq-ta2c-s7fp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71954", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629", "reference_id": "1195629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826", "reference_id": "CVE-2015-0826", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20", "reference_id": "mfsa2015-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0826" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57039?format=api", "vulnerability_id": "VCID-4vhr-24e3-d3d2", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.8411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84068", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84069", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84099", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1593" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1085175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1085175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-88.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-88.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71395" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169209", "reference_id": "1169209", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169209" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1593", "reference_id": "CVE-2014-1593", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1593" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-88", "reference_id": "mfsa2014-88", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-88" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1593" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56974?format=api", "vulnerability_id": "VCID-4xgr-unyn-jkfj", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1578" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063327" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-77.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-77.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70428" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152361", "reference_id": "1152361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152361" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435", "reference_id": "765435", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1578", "reference_id": "CVE-2014-1578", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1578" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-77", "reference_id": "mfsa2014-77", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-77" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1578" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xgr-unyn-jkfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56703?format=api", "vulnerability_id": "VCID-4yww-etfw-cug5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.9869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.70488", "scoring_system": "epss", "scoring_elements": "0.98689", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490", "reference_id": "1077490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-29", "reference_id": "mfsa2014-29", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1511" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yww-etfw-cug5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56806?format=api", "vulnerability_id": "VCID-52kt-axpr-vydx", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67565", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67638", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092660", "reference_id": "1092660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092660" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-37", "reference_id": "mfsa2014-37", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1523" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52kt-axpr-vydx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56804?format=api", "vulnerability_id": "VCID-5fwj-z7cg-rubb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.8615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86111", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.8613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86156", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02818", "scoring_system": "epss", "scoring_elements": "0.86154", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092657", "reference_id": "1092657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092657" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-34", "reference_id": "mfsa2014-34", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-34" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1518" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwj-z7cg-rubb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56701?format=api", "vulnerability_id": "VCID-5vvt-9wk5-qbej", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.98704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.98696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.98708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.98705", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.71088", "scoring_system": "epss", "scoring_elements": "0.98707", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490", "reference_id": "1077490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb", "reference_id": "CVE-2014-1511;OSVDB-104594;CVE-2014-1510;OSVDB-104593", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-29", "reference_id": "mfsa2014-29", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1510" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vvt-9wk5-qbej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61206?format=api", "vulnerability_id": "VCID-5wtn-t32h-xyg7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76105", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76047", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.7608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.7606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76107", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76132", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76108", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039427", "reference_id": "1039427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672", "reference_id": "CVE-2013-6672", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-112", "reference_id": "mfsa2013-112", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-112" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-6672" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtn-t32h-xyg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61218?format=api", "vulnerability_id": "VCID-5xfz-9tyc-xfh3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84602", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.8456", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84564", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84606", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1500" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077020", "reference_id": "1077020", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500", "reference_id": "CVE-2014-1500", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-20", "reference_id": "mfsa2014-20", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-20" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1500" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xfz-9tyc-xfh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61297?format=api", "vulnerability_id": "VCID-5z4v-hqea-eucx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80006", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79955", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80014", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639", "reference_id": "1195639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821", "reference_id": "CVE-2015-0821", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25", "reference_id": "mfsa2015-25", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0821" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61199?format=api", "vulnerability_id": "VCID-62px-695g-57bk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5613", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93438", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11056", "scoring_system": "epss", "scoring_elements": "0.93444", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5613" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429", "reference_id": "1039429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613", "reference_id": "CVE-2013-5613", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-114", "reference_id": "mfsa2013-114", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-114" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5613" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57038?format=api", "vulnerability_id": "VCID-63hm-xmht-g3cp", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1592" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1088635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1088635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-87.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-87.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71398" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169208", "reference_id": "1169208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169208" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1592", "reference_id": "CVE-2014-1592", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1592" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-87", "reference_id": "mfsa2014-87", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-87" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1592" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61298?format=api", "vulnerability_id": "VCID-664r-gx3z-d7c6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82274", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82315", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82336", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195636", "reference_id": "1195636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823", "reference_id": "CVE-2015-0823", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-23", "reference_id": "mfsa2015-23", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-23" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0823" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-664r-gx3z-d7c6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61205?format=api", "vulnerability_id": "VCID-69g6-8d1a-kubz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93214", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93187", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.9321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10399", "scoring_system": "epss", "scoring_elements": "0.93212", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6671" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426", "reference_id": "1039426", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671", "reference_id": "CVE-2013-6671", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-111", "reference_id": "mfsa2013-111", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-6671" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61269?format=api", "vulnerability_id": "VCID-6gmw-bq5a-6qgg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82115", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01676", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1588" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1013001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1013001" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023158" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1026037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1026037" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037830" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1048517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1048517" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064835" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1073577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1073577" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075546" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1077687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1077687" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1086842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1086842" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1096026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1096026" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169204", "reference_id": "1169204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169204" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588", "reference_id": "CVE-2014-1588", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1588", "reference_id": "CVE-2014-1588", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1588" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83", "reference_id": "mfsa2014-83", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1588" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gmw-bq5a-6qgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56706?format=api", "vulnerability_id": "VCID-6hk9-8e47-zbhw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81698", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81722", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01605", "scoring_system": "epss", "scoring_elements": "0.81734", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492", "reference_id": "1077492", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-31", "reference_id": "mfsa2014-31", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-31" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1513" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6hk9-8e47-zbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56914?format=api", "vulnerability_id": "VCID-6rfs-5xxg-r3d3", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0741.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0742.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83449", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83517", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83477", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83499", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01963", "scoring_system": "epss", "scoring_elements": "0.83509", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1541" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" }, { "reference_url": "http://secunia.com/advisories/58984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58984" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59149", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59149" }, { "reference_url": "http://secunia.com/advisories/59150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59150" }, { "reference_url": "http://secunia.com/advisories/59165", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59165" }, { "reference_url": "http://secunia.com/advisories/59169", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59169" }, { "reference_url": "http://secunia.com/advisories/59170", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59170" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59275" }, { "reference_url": "http://secunia.com/advisories/59328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59328" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2955" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2960", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2960" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-52.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-52.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67979", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67979" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2250-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2250-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107424", "reference_id": "1107424", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107424" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1541", "reference_id": "CVE-2014-1541", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1541" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-52", "reference_id": "mfsa2014-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0741", "reference_id": "RHSA-2014:0741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0742", "reference_id": "RHSA-2014:0742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0742" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" }, { "reference_url": "https://usn.ubuntu.com/2250-1/", "reference_id": "USN-2250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2250-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1541" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rfs-5xxg-r3d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61209?format=api", "vulnerability_id": "VCID-6t5b-ykw1-rqdt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66781", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.6683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66844", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66864", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.6685", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1480" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060941", "reference_id": "1060941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480", "reference_id": "CVE-2014-1480", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-03", "reference_id": "mfsa2014-03", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-03" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1480" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5b-ykw1-rqdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56815?format=api", "vulnerability_id": "VCID-6ucm-3m3f-kfgs", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89767", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.8977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89811", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89818", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05086", "scoring_system": "epss", "scoring_elements": "0.89816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092668", "reference_id": "1092668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092668" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-44", "reference_id": "mfsa2014-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1531" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ucm-3m3f-kfgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61248?format=api", "vulnerability_id": "VCID-7hub-7qnq-63es", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79464", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1004480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1004480" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1016519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1016519" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990247" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995704" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69526", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69526" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135863", "reference_id": "1135863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135863" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554", "reference_id": "CVE-2014-1554", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1554", "reference_id": "CVE-2014-1554", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1554" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67", "reference_id": "mfsa2014-67", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1554" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hub-7qnq-63es" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61225?format=api", "vulnerability_id": "VCID-7q2x-fv9r-ckdb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72001", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72008", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72016", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1526" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095074", "reference_id": "1095074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526", "reference_id": "CVE-2014-1526", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-47", "reference_id": "mfsa2014-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-47" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1526" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7q2x-fv9r-ckdb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61228?format=api", "vulnerability_id": "VCID-7sgt-5xdn-tkey", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87238", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87248", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87281", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03334", "scoring_system": "epss", "scoring_elements": "0.87289", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1537" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=999274", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=999274" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67971", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67971" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107419", "reference_id": "1107419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107419" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537", "reference_id": "CVE-2014-1537", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1537", "reference_id": "CVE-2014-1537", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1537" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49", "reference_id": "mfsa2014-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1537" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sgt-5xdn-tkey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56698?format=api", "vulnerability_id": "VCID-81hn-3y96-77db", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.7677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00986", "scoring_system": "epss", "scoring_elements": "0.76834", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025", "reference_id": "1077025", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-26", "reference_id": "mfsa2014-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1508" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81hn-3y96-77db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34044?format=api", "vulnerability_id": "VCID-8j3v-g9xv-gud5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Network\n Security Service, the worst of which could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85622", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.8555", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.8558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85616", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.8563", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02604", "scoring_system": "epss", "scoring_elements": "0.85626", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031458", "reference_id": "1031458", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031458" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105", "reference_id": "735105", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105" }, { "reference_url": "https://security.gentoo.org/glsa/201406-19", "reference_id": "GLSA-201406-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-19" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103", "reference_id": "mfsa2013-103", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1791", "reference_id": "RHSA-2013:1791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1829", "reference_id": "RHSA-2013:1829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1829" }, { "reference_url": "https://usn.ubuntu.com/2030-1/", "reference_id": "USN-2030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2030-1/" }, { "reference_url": "https://usn.ubuntu.com/2031-1/", "reference_id": "USN-2031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2031-1/" }, { "reference_url": "https://usn.ubuntu.com/2032-1/", "reference_id": "USN-2032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2032-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-1741" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8j3v-g9xv-gud5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57035?format=api", "vulnerability_id": "VCID-8s1b-yh8y-cbdk", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.8189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.8192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81947", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81954", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1587" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1042567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1042567" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072847" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079729" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080312" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1089207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1089207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71391", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71391" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169201", "reference_id": "1169201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169201" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1587", "reference_id": "CVE-2014-1587", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1587" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83", "reference_id": "mfsa2014-83", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1587" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34049?format=api", "vulnerability_id": "VCID-97rg-h7t5-1fhs", "summary": "Multiple vulnerabilities have been discovered in Mozilla Network\n Security Service, the worst of which could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81653", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.8159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81647", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81652", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81673", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01591", "scoring_system": "epss", "scoring_elements": "0.81659", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031461", "reference_id": "1031461", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031461" }, { "reference_url": "https://security.gentoo.org/glsa/201406-19", "reference_id": "GLSA-201406-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-19" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103", "reference_id": "mfsa2013-103", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1791", "reference_id": "RHSA-2013:1791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1829", "reference_id": "RHSA-2013:1829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1829" }, { "reference_url": "https://usn.ubuntu.com/2031-1/", "reference_id": "USN-2031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2031-1/" }, { "reference_url": "https://usn.ubuntu.com/2032-1/", "reference_id": "USN-2032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2032-1/" }, { "reference_url": "https://usn.ubuntu.com/2087-1/", "reference_id": "USN-2087-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2087-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5607" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-97rg-h7t5-1fhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58189?format=api", "vulnerability_id": "VCID-9bat-kqxd-gkg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82555", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.8255", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180962", "reference_id": "1180962", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180962" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01", "reference_id": "mfsa2015-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0047", "reference_id": "RHSA-2015:0047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0047" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" }, { "reference_url": "https://usn.ubuntu.com/2460-1/", "reference_id": "USN-2460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2460-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8634" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=api", "vulnerability_id": "VCID-9e6r-hnyd-6ufr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.6654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66606", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616", "reference_id": "1195616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834", "reference_id": "CVE-2015-0834", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15", "reference_id": "mfsa2015-15", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0834" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61230?format=api", "vulnerability_id": "VCID-9kcz-e3yx-ckgf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77024", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77089", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01009", "scoring_system": "epss", "scoring_elements": "0.77081", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1540" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978862" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-51.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-51.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67978", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67978" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107423", "reference_id": "1107423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107423" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540", "reference_id": "CVE-2014-1540", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1540", "reference_id": "CVE-2014-1540", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1540" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-51", "reference_id": "mfsa2014-51", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-51" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1540" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9kcz-e3yx-ckgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56811?format=api", "vulnerability_id": "VCID-adnk-um4v-q7dm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79854", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.7987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79878", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01321", "scoring_system": "epss", "scoring_elements": "0.79882", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092664", "reference_id": "1092664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092664" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-42", "reference_id": "mfsa2014-42", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-42" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1529" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-adnk-um4v-q7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61244?format=api", "vulnerability_id": "VCID-apyq-fcne-wqfw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.9014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90097", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90145", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90099", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90131", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05409", "scoring_system": "epss", "scoring_elements": "0.90137", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1551" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018234" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-59.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-59.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551", "reference_id": "CVE-2014-1551", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1551", "reference_id": "CVE-2014-1551", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1551" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-59", "reference_id": "mfsa2014-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-59" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1551" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apyq-fcne-wqfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61245?format=api", "vulnerability_id": "VCID-at2x-qdn8-4bgy", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42141", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42093", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42204", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4217", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42182", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1552" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=985135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=985135" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-66.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-66.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121481", "reference_id": "1121481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121481" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552", "reference_id": "CVE-2014-1552", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1552", "reference_id": "CVE-2014-1552", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1552" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-66", "reference_id": "mfsa2014-66", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-66" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1552" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-at2x-qdn8-4bgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61203?format=api", "vulnerability_id": "VCID-b2k8-kjmq-1kh4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93199", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10378", "scoring_system": "epss", "scoring_elements": "0.93206", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5618" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423", "reference_id": "1039423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618", "reference_id": "CVE-2013-5618", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-109", "reference_id": "mfsa2013-109", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5618" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56669?format=api", "vulnerability_id": "VCID-b3mt-3nfn-suc1", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81519", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81448", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81481", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81506", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81532", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060953", "reference_id": "1060953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060953" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-12", "reference_id": "mfsa2014-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-12" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0917", "reference_id": "RHSA-2014:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1246", "reference_id": "RHSA-2014:1246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1246" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1490" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mt-3nfn-suc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61293?format=api", "vulnerability_id": "VCID-b3n2-ujct-nbcy", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8642", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71015", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.7106", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71074", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71098", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71082", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180974", "reference_id": "1180974", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642", "reference_id": "CVE-2014-8642", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-08", "reference_id": "mfsa2015-08", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-08" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8642" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3n2-ujct-nbcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61299?format=api", "vulnerability_id": "VCID-ba82-rgap-z7ck", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81645", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633", "reference_id": "1195633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824", "reference_id": "CVE-2015-0824", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22", "reference_id": "mfsa2015-22", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0824" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61232?format=api", "vulnerability_id": "VCID-bqyr-zs78-13en", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87425", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.8738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03404", "scoring_system": "epss", "scoring_elements": "0.87421", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1543" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011859" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-54.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-54.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67969", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67969" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108682", "reference_id": "1108682", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108682" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543", "reference_id": "CVE-2014-1543", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1543", "reference_id": "CVE-2014-1543", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1543" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-54", "reference_id": "mfsa2014-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-54" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1543" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqyr-zs78-13en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56971?format=api", "vulnerability_id": "VCID-bu79-vmrf-v7cy", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89276", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89282", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89315", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04667", "scoring_system": "epss", "scoring_elements": "0.89319", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1576" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1041512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1041512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-75.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-75.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70430" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152358", "reference_id": "1152358", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152358" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1576", "reference_id": "CVE-2014-1576", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1576" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-75", "reference_id": "mfsa2014-75", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-75" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1576" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bu79-vmrf-v7cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61193?format=api", "vulnerability_id": "VCID-cdpz-9xmq-nygt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82674", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82608", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82634", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.8266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82685", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82679", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023840", "reference_id": "1023840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596", "reference_id": "CVE-2013-5596", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-97", "reference_id": "mfsa2013-97", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-97" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5596" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cdpz-9xmq-nygt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56970?format=api", "vulnerability_id": "VCID-cjda-dm64-kqg2", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1574" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011354", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011354" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061214" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061600" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064346" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072044" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70436" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152356", "reference_id": "1152356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152356" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1574", "reference_id": "CVE-2014-1574", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1574" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74", "reference_id": "mfsa2014-74", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1574" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61207?format=api", "vulnerability_id": "VCID-cnc6-yyk1-zqc3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67801", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.6781", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6673" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039428", "reference_id": "1039428", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039428" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673", "reference_id": "CVE-2013-6673", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-113", "reference_id": "mfsa2013-113", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-113" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-6673" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnc6-yyk1-zqc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61295?format=api", "vulnerability_id": "VCID-crfx-bba1-97b6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0819", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75804", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75808", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.7584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75868", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0819" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195640", "reference_id": "1195640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819", "reference_id": "CVE-2015-0819", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-26", "reference_id": "mfsa2015-26", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-26" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0819" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crfx-bba1-97b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56697?format=api", "vulnerability_id": "VCID-ct3d-sqe7-vyhh", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68834", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68836", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68878", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00578", "scoring_system": "epss", "scoring_elements": "0.68863", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029", "reference_id": "1077029", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-28", "reference_id": "mfsa2014-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1505" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ct3d-sqe7-vyhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61202?format=api", "vulnerability_id": "VCID-db94-kcvc-zybp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86239", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.8624", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.8627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86284", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86282", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5616" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422", "reference_id": "1039422", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616", "reference_id": "CVE-2013-5616", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-108", "reference_id": "mfsa2013-108", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5616" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56699?format=api", "vulnerability_id": "VCID-dhhr-be6c-73a6", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74207", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.7423", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028", "reference_id": "1077028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-27", "reference_id": "mfsa2014-27", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1509" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dhhr-be6c-73a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=api", "vulnerability_id": "VCID-dm6s-ammq-33dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71146", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631", "reference_id": "1195631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825", "reference_id": "CVE-2015-0825", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21", "reference_id": "mfsa2015-21", "reference_type": "", "scores": [ { "value": "medium", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61257?format=api", "vulnerability_id": "VCID-dn78-xcpj-97af", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73155", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73129", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73179", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1561" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000514" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=910375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=910375" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-60.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-60.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121473", "reference_id": "1121473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121473" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561", "reference_id": "CVE-2014-1561", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1561", "reference_id": "CVE-2014-1561", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1561" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-60", "reference_id": "mfsa2014-60", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-60" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1561" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn78-xcpj-97af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34046?format=api", "vulnerability_id": "VCID-dtrc-mwu9-2bdf", "summary": "Multiple vulnerabilities have been discovered in Mozilla Network\n Security Service, the worst of which could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86084", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.8602", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86031", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86067", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86077", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86092", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0279", "scoring_system": "epss", "scoring_elements": "0.86089", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5605" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030807", "reference_id": "1030807", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030807" }, { "reference_url": "https://security.gentoo.org/glsa/201406-19", "reference_id": "GLSA-201406-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-19" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103", "reference_id": "mfsa2013-103", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1791", "reference_id": "RHSA-2013:1791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1829", "reference_id": "RHSA-2013:1829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1840", "reference_id": "RHSA-2013:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1841", "reference_id": "RHSA-2013:1841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0041", "reference_id": "RHSA-2014:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0041" }, { "reference_url": "https://usn.ubuntu.com/2030-1/", "reference_id": "USN-2030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2030-1/" }, { "reference_url": "https://usn.ubuntu.com/2031-1/", "reference_id": "USN-2031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2031-1/" }, { "reference_url": "https://usn.ubuntu.com/2032-1/", "reference_id": "USN-2032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2032-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5605" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrc-mwu9-2bdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56664?format=api", "vulnerability_id": "VCID-dzfq-91b8-kqcd", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85983", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85917", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85929", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85976", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.8599", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02741", "scoring_system": "epss", "scoring_elements": "0.85988", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060942", "reference_id": "1060942", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060942" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-04", "reference_id": "mfsa2014-04", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1482" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzfq-91b8-kqcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55674?format=api", "vulnerability_id": "VCID-dzyy-5mb7-kugn", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83841", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83856", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83859", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02058", "scoring_system": "epss", "scoring_elements": "0.83899", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023835", "reference_id": "1023835", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023835" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93", "reference_id": "mfsa2013-93", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5590" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzyy-5mb7-kugn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57041?format=api", "vulnerability_id": "VCID-e1ef-b4f7-7yd8", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82183", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82247", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1594" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-89.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-89.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71396", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71396" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169210", "reference_id": "1169210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169210" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1594", "reference_id": "CVE-2014-1594", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1594" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-89", "reference_id": "mfsa2014-89", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-89" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1594" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=api", "vulnerability_id": "VCID-ep8z-jvbx-rqcj", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605", "reference_id": "1195605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11", "reference_id": "mfsa2015-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0836" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58191?format=api", "vulnerability_id": "VCID-f1nz-g5h1-m7dm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65798", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65811", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65822", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65828", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180966", "reference_id": "1180966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180966" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-03", "reference_id": "mfsa2015-03", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0047", "reference_id": "RHSA-2015:0047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0047" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" }, { "reference_url": "https://usn.ubuntu.com/2460-1/", "reference_id": "USN-2460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2460-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8638" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61270?format=api", "vulnerability_id": "VCID-f7my-dd2c-mfex", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1589", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53741", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53726", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1589" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1043787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1043787" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-84.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-84.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169205", "reference_id": "1169205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169205" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589", "reference_id": "CVE-2014-1589", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1589", "reference_id": "CVE-2014-1589", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1589" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-84", "reference_id": "mfsa2014-84", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-84" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1589" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f7my-dd2c-mfex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56912?format=api", "vulnerability_id": "VCID-faad-47h1-nbh3", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0741.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0742.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.8585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85782", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02681", "scoring_system": "epss", "scoring_elements": "0.85835", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1538" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1005584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1005584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" }, { "reference_url": "http://secunia.com/advisories/58984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58984" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59149", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59149" }, { "reference_url": "http://secunia.com/advisories/59150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59150" }, { "reference_url": "http://secunia.com/advisories/59165", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59165" }, { "reference_url": "http://secunia.com/advisories/59169", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59169" }, { "reference_url": "http://secunia.com/advisories/59170", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59170" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59275" }, { "reference_url": "http://secunia.com/advisories/59328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59328" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2955" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2960", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2960" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67976" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2250-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2250-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107421", "reference_id": "1107421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107421" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1538", "reference_id": "CVE-2014-1538", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1538" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49", "reference_id": "mfsa2014-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0741", "reference_id": "RHSA-2014:0741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0742", "reference_id": "RHSA-2014:0742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0742" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" }, { "reference_url": "https://usn.ubuntu.com/2250-1/", "reference_id": "USN-2250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2250-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1538" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-faad-47h1-nbh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61265?format=api", "vulnerability_id": "VCID-fwk8-2rdv-cycf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83547", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.8356", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.836", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0199", "scoring_system": "epss", "scoring_elements": "0.83608", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1575" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1001994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1001994" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018916" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020034" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023035" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1032208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1032208" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1033020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1033020" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1034230", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1034230" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/70439", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70439" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152357", "reference_id": "1152357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152357" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575", "reference_id": "CVE-2014-1575", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1575", "reference_id": "CVE-2014-1575", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1575" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74", "reference_id": "mfsa2014-74", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1575" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk8-2rdv-cycf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56937?format=api", "vulnerability_id": "VCID-g4rq-n73t-rbcr", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0918.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85089", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85151", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1557" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=913805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" }, { "reference_url": "http://secunia.com/advisories/59591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59591" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60306" }, { "reference_url": "http://secunia.com/advisories/60486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60486" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2986" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2996" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-64.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68824", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68824" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121479", "reference_id": "1121479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121479" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1557", "reference_id": "CVE-2014-1557", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1557" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-64", "reference_id": "mfsa2014-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-64" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0918", "reference_id": "RHSA-2014:0918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0919", "reference_id": "RHSA-2014:0919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0919" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1557" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rq-n73t-rbcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58193?format=api", "vulnerability_id": "VCID-g8ft-s7wx-n7ea", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82938", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82889", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82924", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82931", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82947", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01837", "scoring_system": "epss", "scoring_elements": "0.82942", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180967", "reference_id": "1180967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180967" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-04", "reference_id": "mfsa2015-04", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0047", "reference_id": "RHSA-2015:0047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0047" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" }, { "reference_url": "https://usn.ubuntu.com/2460-1/", "reference_id": "USN-2460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2460-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8639" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g8ft-s7wx-n7ea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61252?format=api", "vulnerability_id": "VCID-ggs9-bydj-sue4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.6834", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1558" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1015973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1015973" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480", "reference_id": "1121480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558", "reference_id": "CVE-2014-1558", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1558", "reference_id": "CVE-2014-1558", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1558" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65", "reference_id": "mfsa2014-65", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1558" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ggs9-bydj-sue4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61198?format=api", "vulnerability_id": "VCID-gsx1-3jjx-nqan", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72842", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72896", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72921", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5612" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420", "reference_id": "1039420", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612", "reference_id": "CVE-2013-5612", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-106", "reference_id": "mfsa2013-106", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5612" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61292?format=api", "vulnerability_id": "VCID-gx4v-yve4-gbga", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78366", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78397", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.7838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78407", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01542", "scoring_system": "epss", "scoring_elements": "0.81374", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01542", "scoring_system": "epss", "scoring_elements": "0.81381", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180970", "reference_id": "1180970", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640", "reference_id": "CVE-2014-8640", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-05", "reference_id": "mfsa2015-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-05" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8640" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56976?format=api", "vulnerability_id": "VCID-hb1k-vzww-8bbm", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84715", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84744", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1581" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70426" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152363", "reference_id": "1152363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152363" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1581", "reference_id": "CVE-2014-1581", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1581" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-79", "reference_id": "mfsa2014-79", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-79" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1581" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56963?format=api", "vulnerability_id": "VCID-hedr-7c4z-nfa9", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84581", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.8459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.8454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02248", "scoring_system": "epss", "scoring_elements": "0.84571", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1567" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/60186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60186" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://secunia.com/advisories/61390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61390" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3018" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3028" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-72.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-72.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69520", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69520" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135869", "reference_id": "1135869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135869" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1567", "reference_id": "CVE-2014-1567", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1567" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-72", "reference_id": "mfsa2014-72", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-72" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1144", "reference_id": "RHSA-2014:1144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1145", "reference_id": "RHSA-2014:1145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1145" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1567" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hedr-7c4z-nfa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55679?format=api", "vulnerability_id": "VCID-hmmv-8y6q-hbgc", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8579", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85824", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85865", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843", "reference_id": "1023843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100", "reference_id": "mfsa2013-100", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5601" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmv-8y6q-hbgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61227?format=api", "vulnerability_id": "VCID-hrzr-h3xb-e3ed", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80128", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80101", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01355", "scoring_system": "epss", "scoring_elements": "0.80125", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1536" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=989994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=989994" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-49.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67966", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67966" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107419", "reference_id": "1107419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107419" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536", "reference_id": "CVE-2014-1536", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1536", "reference_id": "CVE-2014-1536", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1536" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49", "reference_id": "mfsa2014-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-49" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1536" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrzr-h3xb-e3ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61195?format=api", "vulnerability_id": "VCID-hx2h-j392-7ye8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.90004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.89955", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.89958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.8997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.89977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.89993", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.89998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0527", "scoring_system": "epss", "scoring_elements": "0.90006", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5603" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023845", "reference_id": "1023845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603", "reference_id": "CVE-2013-5603", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-102", "reference_id": "mfsa2013-102", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-102" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5603" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hx2h-j392-7ye8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59577?format=api", "vulnerability_id": "VCID-jb34-jknb-yygv", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.80012", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.7996", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.79968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.79989", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.79979", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.80007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.80016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.80036", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0134", "scoring_system": "epss", "scoring_elements": "0.8002", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204362", "reference_id": "1204362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204362" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-29", "reference_id": "mfsa2015-29", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0718", "reference_id": "RHSA-2015:0718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0718" }, { "reference_url": "https://usn.ubuntu.com/2538-1/", "reference_id": "USN-2538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2538-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0817" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jb34-jknb-yygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=api", "vulnerability_id": "VCID-jj3q-bub2-y3b2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70483", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638", "reference_id": "1195638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24", "reference_id": "mfsa2015-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0822" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34047?format=api", "vulnerability_id": "VCID-jm5w-6pdb-bbes", "summary": "Multiple vulnerabilities have been discovered in Mozilla Network\n Security Service, the worst of which could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5606", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71141", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71092", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00661", "scoring_system": "epss", "scoring_elements": "0.71157", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031457", "reference_id": "1031457", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031457" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105", "reference_id": "735105", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105" }, { "reference_url": "https://security.gentoo.org/glsa/201406-19", "reference_id": "GLSA-201406-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-19" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103", "reference_id": "mfsa2013-103", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1791", "reference_id": "RHSA-2013:1791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1829", "reference_id": "RHSA-2013:1829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0041", "reference_id": "RHSA-2014:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0041" }, { "reference_url": "https://usn.ubuntu.com/2030-1/", "reference_id": "USN-2030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5606" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm5w-6pdb-bbes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61253?format=api", "vulnerability_id": "VCID-jneb-mxc6-17a4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.6834", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1559" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1026022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1026022" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-65.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480", "reference_id": "1121480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121480" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559", "reference_id": "CVE-2014-1559", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1559", "reference_id": "CVE-2014-1559", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1559" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65", "reference_id": "mfsa2014-65", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-65" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1559" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jneb-mxc6-17a4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61242?format=api", "vulnerability_id": "VCID-jxwt-ya4f-wqbg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86821", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86886", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86851", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1549" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020205" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-57.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-57.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68820", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68820" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121470", "reference_id": "1121470", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121470" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549", "reference_id": "CVE-2014-1549", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1549", "reference_id": "CVE-2014-1549", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1549" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-57", "reference_id": "mfsa2014-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-57" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1549" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwt-ya4f-wqbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61204?format=api", "vulnerability_id": "VCID-k1sx-wcjc-jqcr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82381", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82396", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.8241", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82438", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0173", "scoring_system": "epss", "scoring_elements": "0.82459", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039424", "reference_id": "1039424", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619", "reference_id": "CVE-2013-5619", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-110", "reference_id": "mfsa2013-110", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-110" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5619" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1sx-wcjc-jqcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=api", "vulnerability_id": "VCID-k69z-4hzh-5yd4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76955", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623", "reference_id": "1195623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19", "reference_id": "mfsa2015-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0827" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56813?format=api", "vulnerability_id": "VCID-k7cw-7tng-xka2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75064", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75066", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75107", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75118", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.7514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00865", "scoring_system": "epss", "scoring_elements": "0.75119", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092666", "reference_id": "1092666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092666" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-43", "reference_id": "mfsa2014-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-43" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1530" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k7cw-7tng-xka2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61229?format=api", "vulnerability_id": "VCID-kcmm-pwr4-cqcm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73083", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73093", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73114", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73088", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73124", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0075", "scoring_system": "epss", "scoring_elements": "0.73137", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1539" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995603" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-50.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-50.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67967" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539", "reference_id": "CVE-2014-1539", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1539", "reference_id": "CVE-2014-1539", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1539" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-50", "reference_id": "mfsa2014-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-50" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1539" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcmm-pwr4-cqcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56933?format=api", "vulnerability_id": "VCID-kway-xy2z-5fak", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0918.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87292", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.8735", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87317", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03359", "scoring_system": "epss", "scoring_elements": "0.87343", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1555" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1023121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" }, { "reference_url": "http://secunia.com/advisories/59591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59591" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60306" }, { "reference_url": "http://secunia.com/advisories/60486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60486" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2986" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2996" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-61.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68814", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68814" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121476", "reference_id": "1121476", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121476" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1555", "reference_id": "CVE-2014-1555", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1555" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-61", "reference_id": "mfsa2014-61", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-61" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0918", "reference_id": "RHSA-2014:0918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0919", "reference_id": "RHSA-2014:0919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0919" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1555" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kway-xy2z-5fak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56659?format=api", "vulnerability_id": "VCID-m5p4-q6ru-jbhr", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74906", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74865", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74914", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74937", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00852", "scoring_system": "epss", "scoring_elements": "0.74915", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060938", "reference_id": "1060938", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060938" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-01", "reference_id": "mfsa2014-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1477" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5p4-q6ru-jbhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61197?format=api", "vulnerability_id": "VCID-m6b2-ap8v-e7gz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75361", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75308", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00881", "scoring_system": "epss", "scoring_elements": "0.75373", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5610" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039418", "reference_id": "1039418", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610", "reference_id": "CVE-2013-5610", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104", "reference_id": "mfsa2013-104", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5610" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m6b2-ap8v-e7gz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61261?format=api", "vulnerability_id": "VCID-m7a7-kcdr-pkcr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.74011", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73944", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.7394", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00796", "scoring_system": "epss", "scoring_elements": "0.73988", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1565" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1047831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1047831" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-70.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-70.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69521" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135868", "reference_id": "1135868", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135868" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565", "reference_id": "CVE-2014-1565", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1565", "reference_id": "CVE-2014-1565", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1565" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-70", "reference_id": "mfsa2014-70", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-70" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1565" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7a7-kcdr-pkcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56809?format=api", "vulnerability_id": "VCID-mg9v-rjps-9kgm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.91048", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.90997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.91002", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.91011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.91021", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.91034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06412", "scoring_system": "epss", "scoring_elements": "0.9104", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092663", "reference_id": "1092663", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092663" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-38", "reference_id": "mfsa2014-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-38" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1524" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg9v-rjps-9kgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61260?format=api", "vulnerability_id": "VCID-mv8e-2ttb-5ua8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1564", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.9437", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14285", "scoring_system": "epss", "scoring_elements": "0.94391", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1564" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1045977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1045977" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Sep/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2014/Sep/18" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-69.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-69.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/533357/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533357/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/69525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69525" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135865", "reference_id": "1135865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135865" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564", "reference_id": "CVE-2014-1564", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1564", "reference_id": "CVE-2014-1564", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1564" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js", "reference_id": "CVE-2014-1564;OSVDB-110716", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js" }, { "reference_url": "https://www.securityfocus.com/bid/69525/info", "reference_id": "CVE-2014-1564;OSVDB-110716", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/69525/info" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-69", "reference_id": "mfsa2014-69", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-69" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1564" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv8e-2ttb-5ua8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55676?format=api", "vulnerability_id": "VCID-nbqt-kaag-pkcw", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87772", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87794", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87819", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87826", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03629", "scoring_system": "epss", "scoring_elements": "0.87832", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023841", "reference_id": "1023841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023841" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-98", "reference_id": "mfsa2013-98", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-98" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5597" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nbqt-kaag-pkcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61226?format=api", "vulnerability_id": "VCID-p45t-mhpe-4ufg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85839", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85766", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85846", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85843", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85802", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02679", "scoring_system": "epss", "scoring_elements": "0.85831", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1534" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000598" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1000960" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1002340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1002340" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1005578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1005578" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1007223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1007223" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969517" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=969549" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=973874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=973874" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978652" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990868" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995816" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995817" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=996536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=996536" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67964", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67964" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107403", "reference_id": "1107403", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107403" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534", "reference_id": "CVE-2014-1534", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1534", "reference_id": "CVE-2014-1534", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1534" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-48", "reference_id": "mfsa2014-48", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-48" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1534" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p45t-mhpe-4ufg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56983?format=api", "vulnerability_id": "VCID-pbjx-qyn8-s7bt", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73057", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73004", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73063", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73013", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73034", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73009", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73046", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73059", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1583" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1015540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1015540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-82.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-82.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70424", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70424" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152683", "reference_id": "1152683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152683" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1583", "reference_id": "CVE-2014-1583", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1583" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-82", "reference_id": "mfsa2014-82", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-82" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1583" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjx-qyn8-s7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61280?format=api", "vulnerability_id": "VCID-pnba-jmy3-2yfa", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43274", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43289", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43268", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.433", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8632" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1050340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1050340" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169211", "reference_id": "1169211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169211" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632", "reference_id": "CVE-2014-8632", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8632", "reference_id": "CVE-2014-8632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8632" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-91", "reference_id": "mfsa2014-91", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-91" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8632" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pnba-jmy3-2yfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61279?format=api", "vulnerability_id": "VCID-ptkt-s26b-q7hu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44273", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8631" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=821573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=821573" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169211", "reference_id": "1169211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169211" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631", "reference_id": "CVE-2014-8631", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8631", "reference_id": "CVE-2014-8631", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8631" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-91", "reference_id": "mfsa2014-91", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-91" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8631" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkt-s26b-q7hu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56966?format=api", "vulnerability_id": "VCID-qdev-8m9n-8bbr", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html" }, { "reference_url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html" }, { "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698" }, { "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.9673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.34437", "scoring_system": "epss", "scoring_elements": "0.96962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.34437", "scoring_system": "epss", "scoring_elements": "0.9697", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1568" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" }, { "reference_url": "http://secunia.com/advisories/61540", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61540" }, { "reference_url": "http://secunia.com/advisories/61574", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61574" }, { "reference_url": "http://secunia.com/advisories/61575", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61575" }, { "reference_url": "http://secunia.com/advisories/61576", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61576" }, { "reference_url": "http://secunia.com/advisories/61583", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61583" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3033" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3034", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3034" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3037" }, { "reference_url": "http://www.kb.cert.org/vuls/id/772676", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/772676" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015701", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/70116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70116" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2360-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2360-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2360-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2360-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2361-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2361-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", "reference_id": "1145429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", "reference_id": "CVE-2014-1568", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-73", "reference_id": "mfsa2014-73", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-73" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1307", "reference_id": "RHSA-2014:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1371", "reference_id": "RHSA-2014:1371", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1371" }, { "reference_url": "https://usn.ubuntu.com/2360-1/", "reference_id": "USN-2360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2360-1/" }, { "reference_url": "https://usn.ubuntu.com/2360-2/", "reference_id": "USN-2360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2360-2/" }, { "reference_url": "https://usn.ubuntu.com/2361-1/", "reference_id": "USN-2361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1568" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54766?format=api", "vulnerability_id": "VCID-qdqz-admy-e7cg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67166", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67093", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.6713", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.6721", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67196", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060955", "reference_id": "1060955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060955" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-12", "reference_id": "mfsa2014-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-12" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0917", "reference_id": "RHSA-2014:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0979", "reference_id": "RHSA-2014:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1246", "reference_id": "RHSA-2014:1246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1246" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1491" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqz-admy-e7cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61277?format=api", "vulnerability_id": "VCID-qpzb-b3nx-m3cv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5057", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50655", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1591" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069762" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-86.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-86.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169207", "reference_id": "1169207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169207" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591", "reference_id": "CVE-2014-1591", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1591", "reference_id": "CVE-2014-1591", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1591" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-86", "reference_id": "mfsa2014-86", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-86" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1591" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61290?format=api", "vulnerability_id": "VCID-r1ju-8ww8-yygz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.6545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65499", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65561", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180964", "reference_id": "1180964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637", "reference_id": "CVE-2014-8637", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-02", "reference_id": "mfsa2015-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-02" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8637" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ju-8ww8-yygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61302?format=api", "vulnerability_id": "VCID-r39h-25hq-gbdz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80148", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621", "reference_id": "1195621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828", "reference_id": "CVE-2015-0828", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18", "reference_id": "mfsa2015-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0828" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56973?format=api", "vulnerability_id": "VCID-r56k-pzrk-kfbb", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79632", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79581", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79634", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1577" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-76.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-76.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70440" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152359", "reference_id": "1152359", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152359" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1577", "reference_id": "CVE-2014-1577", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1577" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-76", "reference_id": "mfsa2014-76", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-76" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1577" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61247?format=api", "vulnerability_id": "VCID-r5au-uh8y-2ub7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.67973", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68014", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.67992", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68043", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68058", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1553" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1022945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1022945" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1027359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1027359" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1033121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1033121" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1035007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1035007" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1037666" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1041148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1041148" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995075" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69524", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69524" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135863", "reference_id": "1135863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135863" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553", "reference_id": "CVE-2014-1553", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1553", "reference_id": "CVE-2014-1553", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1553" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67", "reference_id": "mfsa2014-67", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1553" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5au-uh8y-2ub7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58197?format=api", "vulnerability_id": "VCID-r8f9-h598-7bg5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.8126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81228", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81268", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180973", "reference_id": "1180973", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180973" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-06", "reference_id": "mfsa2015-06", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8641" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55677?format=api", "vulnerability_id": "VCID-r9u9-r48j-qkgv", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8579", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85824", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85865", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843", "reference_id": "1023843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100", "reference_id": "mfsa2013-100", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5599" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9u9-r48j-qkgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59579?format=api", "vulnerability_id": "VCID-rb29-1vnh-jbgw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.84013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.83945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.83959", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.83978", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.84001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.84008", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.84024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02087", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0818" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204363", "reference_id": "1204363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204363" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-28", "reference_id": "mfsa2015-28", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0718", "reference_id": "RHSA-2015:0718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0718" }, { "reference_url": "https://usn.ubuntu.com/2538-1/", "reference_id": "USN-2538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2538-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0818" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rb29-1vnh-jbgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61213?format=api", "vulnerability_id": "VCID-rcqe-r6h3-yua2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1489", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79298", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.7925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.7928", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79292", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01246", "scoring_system": "epss", "scoring_elements": "0.79309", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1489" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060948", "reference_id": "1060948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489", "reference_id": "CVE-2014-1489", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-10", "reference_id": "mfsa2014-10", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-10" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1489" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcqe-r6h3-yua2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56818?format=api", "vulnerability_id": "VCID-rf6c-27qw-afh8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89549", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89552", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89565", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04891", "scoring_system": "epss", "scoring_elements": "0.89594", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092670", "reference_id": "1092670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092670" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-46", "reference_id": "mfsa2014-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-46" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0448", "reference_id": "RHSA-2014:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0449", "reference_id": "RHSA-2014:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0449" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" }, { "reference_url": "https://usn.ubuntu.com/2189-1/", "reference_id": "USN-2189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1532" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf6c-27qw-afh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61308?format=api", "vulnerability_id": "VCID-rq2s-6pv9-tyee", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0835", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.8112", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.8118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01508", "scoring_system": "epss", "scoring_elements": "0.81191", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0835" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195609", "reference_id": "1195609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835", "reference_id": "CVE-2015-0835", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11", "reference_id": "mfsa2015-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0835" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rq2s-6pv9-tyee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56979?format=api", "vulnerability_id": "VCID-smdh-r7xw-pkc5", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.7194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71867", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71905", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71917", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1586" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1062981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1062981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-81.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-81.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70427" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152366", "reference_id": "1152366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152366" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1586", "reference_id": "CVE-2014-1586", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1586" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-81", "reference_id": "mfsa2014-81", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-81" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1586" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smdh-r7xw-pkc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61288?format=api", "vulnerability_id": "VCID-sme4-gu3c-kkf3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99287", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99285", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.83612", "scoring_system": "epss", "scoring_elements": "0.99288", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8636" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180977", "reference_id": "1180977", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636", "reference_id": "CVE-2014-8636", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb", "reference_id": "CVE-2014-8636;OSVDB-117005", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-09", "reference_id": "mfsa2015-09", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-09" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8636" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sme4-gu3c-kkf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56962?format=api", "vulnerability_id": "VCID-snqg-4mwy-tyee", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79464", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1562" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1054359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1054359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" }, { "reference_url": "http://secunia.com/advisories/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60148" }, { "reference_url": "http://secunia.com/advisories/60186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60186" }, { "reference_url": "http://secunia.com/advisories/61114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61114" }, { "reference_url": "http://secunia.com/advisories/61390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61390" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3018" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3028" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-67.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69519", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69519" }, { "reference_url": "http://www.securitytracker.com/id/1030793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030793" }, { "reference_url": "http://www.securitytracker.com/id/1030794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135862", "reference_id": "1135862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135862" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1562", "reference_id": "CVE-2014-1562", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1562" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67", "reference_id": "mfsa2014-67", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-67" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1144", "reference_id": "RHSA-2014:1144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1145", "reference_id": "RHSA-2014:1145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1145" }, { "reference_url": "https://usn.ubuntu.com/2329-1/", "reference_id": "USN-2329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2329-1/" }, { "reference_url": "https://usn.ubuntu.com/2330-1/", "reference_id": "USN-2330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2330-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1562" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqg-4mwy-tyee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61262?format=api", "vulnerability_id": "VCID-sxdy-axwk-8qeu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70274", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70287", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.7024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70217", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70263", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70278", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1566" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1050690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1050690" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-71.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-71.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/69522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69522" }, { "reference_url": "http://www.securitytracker.com/id/1030792", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030792" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566", "reference_id": "CVE-2014-1566", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1566", "reference_id": "CVE-2014-1566", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1566" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-71", "reference_id": "mfsa2014-71", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-71" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1566" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sxdy-axwk-8qeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61237?format=api", "vulnerability_id": "VCID-tayx-jncr-qkc5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.87007", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.87002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86956", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03199", "scoring_system": "epss", "scoring_elements": "0.86994", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1548" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1002702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1002702" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009675" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1013056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1013056" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020008" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020041" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020219" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021240" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021312" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1021969" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1022773", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1022773" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1028358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1028358" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1034383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1034383" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1035438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1035438" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=990096" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=994444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=994444" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-56.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-56.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68818", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68818" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121469", "reference_id": "1121469", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121469" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548", "reference_id": "CVE-2014-1548", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1548", "reference_id": "CVE-2014-1548", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1548" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-56", "reference_id": "mfsa2014-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-56" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1548" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tayx-jncr-qkc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55678?format=api", "vulnerability_id": "VCID-tbmc-kpsc-ukhj", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8579", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.8582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85824", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02688", "scoring_system": "epss", "scoring_elements": "0.85865", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843", "reference_id": "1023843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023843" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100", "reference_id": "mfsa2013-100", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5600" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tbmc-kpsc-ukhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61217?format=api", "vulnerability_id": "VCID-tjdk-a9k7-8fe4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69721", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69733", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69798", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1499" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077019", "reference_id": "1077019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499", "reference_id": "CVE-2014-1499", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-19", "reference_id": "mfsa2014-19", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-19" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1499" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjdk-a9k7-8fe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56704?format=api", "vulnerability_id": "VCID-u9bh-bnz3-8kbq", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94023", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94033", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12933", "scoring_system": "epss", "scoring_elements": "0.94059", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491", "reference_id": "1077491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-30", "reference_id": "mfsa2014-30", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1512" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bh-bnz3-8kbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61219?format=api", "vulnerability_id": "VCID-ucnp-qr6h-gyg9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.5171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51735", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.5175", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51746", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51775", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1502" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077021", "reference_id": "1077021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502", "reference_id": "CVE-2014-1502", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-22", "reference_id": "mfsa2014-22", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-22" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1502" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucnp-qr6h-gyg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61221?format=api", "vulnerability_id": "VCID-v81u-gbpt-xqae", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84315", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84329", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.8435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84352", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.84397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02191", "scoring_system": "epss", "scoring_elements": "0.8439", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519", "reference_id": "CVE-2014-1519", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-34", "reference_id": "mfsa2014-34", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-34" }, { "reference_url": "https://usn.ubuntu.com/2185-1/", "reference_id": "USN-2185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2185-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1519" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v81u-gbpt-xqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56662?format=api", "vulnerability_id": "VCID-vakw-28yu-9qhy", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85494", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.85573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02581", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060952", "reference_id": "1060952", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060952" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-13", "reference_id": "mfsa2014-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1481" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vakw-28yu-9qhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61268?format=api", "vulnerability_id": "VCID-vc55-3zmr-u3bp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71572", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71596", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.7162", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1584" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1066190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1066190" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-80.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-80.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/70434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70434" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152364", "reference_id": "1152364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152364" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584", "reference_id": "CVE-2014-1584", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1584", "reference_id": "CVE-2014-1584", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1584" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-80", "reference_id": "mfsa2014-80", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-80" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1584" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc55-3zmr-u3bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55680?format=api", "vulnerability_id": "VCID-vd9t-a74z-v7e9", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87013", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87036", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87077", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03229", "scoring_system": "epss", "scoring_elements": "0.87071", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023844", "reference_id": "1023844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023844" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-101", "reference_id": "mfsa2013-101", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1476", "reference_id": "RHSA-2013:1476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1480", "reference_id": "RHSA-2013:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1480" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5602" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vd9t-a74z-v7e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56661?format=api", "vulnerability_id": "VCID-vg52-dyxw-4kes", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80903", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01468", "scoring_system": "epss", "scoring_elements": "0.80914", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060940", "reference_id": "1060940", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060940" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-02", "reference_id": "mfsa2014-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1479" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg52-dyxw-4kes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61196?format=api", "vulnerability_id": "VCID-vg9h-jcc1-9qeg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.86003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.85996", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.8601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02752", "scoring_system": "epss", "scoring_elements": "0.86008", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417", "reference_id": "1039417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609", "reference_id": "CVE-2013-5609", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104", "reference_id": "mfsa2013-104", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5609" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57036?format=api", "vulnerability_id": "VCID-vhpz-366r-hbg1", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77147", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77213", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77154", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77206", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-85.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-85.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71397" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169206", "reference_id": "1169206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169206" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1590", "reference_id": "CVE-2014-1590", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1590" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-85", "reference_id": "mfsa2014-85", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-85" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1590" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61200?format=api", "vulnerability_id": "VCID-vhq8-wmxx-wqgt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5614", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51323", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51227", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51278", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51263", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51358", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51337", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5614" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421", "reference_id": "1039421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614", "reference_id": "CVE-2013-5614", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-107", "reference_id": "mfsa2013-107", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812", "reference_id": "RHSA-2013:1812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823", "reference_id": "RHSA-2013:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5614" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61296?format=api", "vulnerability_id": "VCID-vjt1-8bvw-d7dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56632", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56782", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56767", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820", "reference_id": "CVE-2015-0820", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27", "reference_id": "mfsa2015-27", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0820" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56695?format=api", "vulnerability_id": "VCID-vw8m-869a-c7gn", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.65992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6602", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66037", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66068", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66055", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016", "reference_id": "1077016", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-17", "reference_id": "mfsa2014-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1497" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw8m-869a-c7gn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56928?format=api", "vulnerability_id": "VCID-w5wp-ujx1-vkhp", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.8348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83476", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1544" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" }, { "reference_url": "http://secunia.com/advisories/59591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59591" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60486" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2986" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2996" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/68816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68816" }, { "reference_url": "http://www.securitytracker.com/id/1030617", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030617" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116198", "reference_id": "1116198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116198" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1544", "reference_id": "CVE-2014-1544", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1544" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-63", "reference_id": "mfsa2014-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-63" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0915", "reference_id": "RHSA-2014:0915", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0915" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0916", "reference_id": "RHSA-2014:0916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0917", "reference_id": "RHSA-2014:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1165", "reference_id": "RHSA-2014:1165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1165" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" }, { "reference_url": "https://usn.ubuntu.com/2343-1/", "reference_id": "USN-2343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2343-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1544" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5wp-ujx1-vkhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=api", "vulnerability_id": "VCID-w63q-84j6-h7dk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76259", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613", "reference_id": "1195613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830", "reference_id": "CVE-2015-0830", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14", "reference_id": "mfsa2015-14", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0830" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61243?format=api", "vulnerability_id": "VCID-wauk-j6s7-hugt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88037", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.87978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.87988", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88027", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03758", "scoring_system": "epss", "scoring_elements": "0.88034", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1550" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1020411" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-58.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-58.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121472", "reference_id": "1121472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121472" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550", "reference_id": "CVE-2014-1550", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1550", "reference_id": "CVE-2014-1550", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1550" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-58", "reference_id": "mfsa2014-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-58" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1550" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wauk-j6s7-hugt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34045?format=api", "vulnerability_id": "VCID-wkfm-csjp-v7bx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Network\n Security Service, the worst of which could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.90757", "scoring_system": "epss", "scoring_elements": "0.99622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.90757", "scoring_system": "epss", "scoring_elements": "0.99621", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.90757", "scoring_system": "epss", "scoring_elements": "0.99623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.90757", "scoring_system": "epss", "scoring_elements": "0.99624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.90757", "scoring_system": "epss", "scoring_elements": "0.99625", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2566" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=921947", "reference_id": "921947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566", "reference_id": "CVE-2013-2566", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566" }, { "reference_url": "https://security.gentoo.org/glsa/201406-19", "reference_id": "GLSA-201406-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-19" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103", "reference_id": "mfsa2013-103", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-103" }, { "reference_url": "https://usn.ubuntu.com/2031-1/", "reference_id": "USN-2031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2031-1/" }, { "reference_url": "https://usn.ubuntu.com/2032-1/", "reference_id": "USN-2032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2032-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-2566" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkfm-csjp-v7bx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61214?format=api", "vulnerability_id": "VCID-ws75-69mb-ryc7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68067", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68108", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68151", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68162", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1494" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077014", "reference_id": "1077014", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494", "reference_id": "CVE-2014-1494", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-15", "reference_id": "mfsa2014-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-15" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1494" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws75-69mb-ryc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61212?format=api", "vulnerability_id": "VCID-x8t2-vbc7-e3a6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1488", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77927", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.7787", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77928", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1488" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060949", "reference_id": "1060949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060949" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488", "reference_id": "CVE-2014-1488", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-11", "reference_id": "mfsa2014-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-11" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1488" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8t2-vbc7-e3a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61208?format=api", "vulnerability_id": "VCID-x99v-uyfe-w3ft", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79179", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79121", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.7917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79195", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060939", "reference_id": "1060939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478", "reference_id": "CVE-2014-1478", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-01", "reference_id": "mfsa2014-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-01" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1478" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x99v-uyfe-w3ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61278?format=api", "vulnerability_id": "VCID-xbab-79ux-t3bn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5369", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68924", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68857", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68875", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68945", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68953", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369" }, { "reference_url": "http://secunia.com/advisories/60779", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60779" }, { "reference_url": "http://secunia.com/advisories/60887", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60887" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://sourceforge.net/p/enigmail/bugs/294/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/p/enigmail/bugs/294/" }, { "reference_url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/18/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/18/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/22/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/22/1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5369", "reference_id": "CVE-2014-5369", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5369" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-5369" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbab-79ux-t3bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61220?format=api", "vulnerability_id": "VCID-xkrc-t2jn-dqfb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69555", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69562", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69637", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1504" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077022", "reference_id": "1077022", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504", "reference_id": "CVE-2014-1504", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-23", "reference_id": "mfsa2014-23", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-23" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1504" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xkrc-t2jn-dqfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=api", "vulnerability_id": "VCID-xqqq-rk53-ubhp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1608", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16275", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833", "reference_id": "CVE-2015-0833", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12", "reference_id": "mfsa2015-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58", "reference_id": "mfsa2015-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0833" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56665?format=api", "vulnerability_id": "VCID-xqv7-v1pk-p3f9", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93359", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93329", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93343", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93351", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.9336", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10821", "scoring_system": "epss", "scoring_elements": "0.93358", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060945", "reference_id": "1060945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060945" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-08", "reference_id": "mfsa2014-08", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1486" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqv7-v1pk-p3f9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61266?format=api", "vulnerability_id": "VCID-xs3q-48t9-1qgn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63818", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63914", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63931", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1580" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063733" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-78.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-78.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/70431", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70431" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152362", "reference_id": "1152362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580", "reference_id": "CVE-2014-1580", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1580", "reference_id": "CVE-2014-1580", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1580" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-78", "reference_id": "mfsa2014-78", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-78" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1580" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56930?format=api", "vulnerability_id": "VCID-xy7m-y1mb-n3bv", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0918.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0918.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84448", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.8443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02205", "scoring_system": "epss", "scoring_elements": "0.84435", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1547" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012694" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1019684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1019684" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1024765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1024765" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=985070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=985070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" }, { "reference_url": "http://secunia.com/advisories/59591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59591" }, { "reference_url": "http://secunia.com/advisories/59719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59719" }, { "reference_url": "http://secunia.com/advisories/59760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59760" }, { "reference_url": "http://secunia.com/advisories/60083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60083" }, { "reference_url": "http://secunia.com/advisories/60306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60306" }, { "reference_url": "http://secunia.com/advisories/60486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60486" }, { "reference_url": "http://secunia.com/advisories/60621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60621" }, { "reference_url": "http://secunia.com/advisories/60628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60628" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2986" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2996" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-56.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-56.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/68811", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68811" }, { "reference_url": "http://www.securitytracker.com/id/1030619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030619" }, { "reference_url": "http://www.securitytracker.com/id/1030620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121464", "reference_id": "1121464", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121464" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1547", "reference_id": "CVE-2014-1547", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1547" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-56", "reference_id": "mfsa2014-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0918", "reference_id": "RHSA-2014:0918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0919", "reference_id": "RHSA-2014:0919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0919" }, { "reference_url": "https://usn.ubuntu.com/2295-1/", "reference_id": "USN-2295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2295-1/" }, { "reference_url": "https://usn.ubuntu.com/2296-1/", "reference_id": "USN-2296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2296-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1547" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xy7m-y1mb-n3bv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61211?format=api", "vulnerability_id": "VCID-xymx-1zrp-syg3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76544", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.7657", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1485" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060944", "reference_id": "1060944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060944" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485", "reference_id": "CVE-2014-1485", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-07", "reference_id": "mfsa2014-07", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-07" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1485" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xymx-1zrp-syg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61267?format=api", "vulnerability_id": "VCID-y2tp-wrva-hkc5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.7534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75351", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75342", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00879", "scoring_system": "epss", "scoring_elements": "0.75352", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1582" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1049095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1049095" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-80.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-80.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/70432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70432" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152364", "reference_id": "1152364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152364" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582", "reference_id": "CVE-2014-1582", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1582", "reference_id": "CVE-2014-1582", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1582" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-80", "reference_id": "mfsa2014-80", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-80" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1582" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2tp-wrva-hkc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56667?format=api", "vulnerability_id": "VCID-y3b2-26sv-97a5", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69744", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69679", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69773", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0061", "scoring_system": "epss", "scoring_elements": "0.69758", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060947", "reference_id": "1060947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060947" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-09", "reference_id": "mfsa2014-09", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0132", "reference_id": "RHSA-2014:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0133", "reference_id": "RHSA-2014:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0133" }, { "reference_url": "https://usn.ubuntu.com/2102-1/", "reference_id": "USN-2102-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2102-1/" }, { "reference_url": "https://usn.ubuntu.com/2119-1/", "reference_id": "USN-2119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2119-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1487" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3b2-26sv-97a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61192?format=api", "vulnerability_id": "VCID-y9mj-mmex-vbeu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65192", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65111", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65161", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65186", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.6522", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5593" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023836", "reference_id": "1023836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593", "reference_id": "CVE-2013-5593", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-94", "reference_id": "mfsa2013-94", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-94" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" }, { "reference_url": "https://usn.ubuntu.com/2010-1/", "reference_id": "USN-2010-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2010-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5593" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9mj-mmex-vbeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61191?format=api", "vulnerability_id": "VCID-yau8-zmtt-1ke1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85711", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85723", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02659", "scoring_system": "epss", "scoring_elements": "0.85788", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592", "reference_id": "CVE-2013-5592", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93", "reference_id": "mfsa2013-93", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-93" }, { "reference_url": "https://usn.ubuntu.com/2009-1/", "reference_id": "USN-2009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2009-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5592" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yau8-zmtt-1ke1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61215?format=api", "vulnerability_id": "VCID-ydrd-xcq5-67aj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20004", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19731", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19829", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1496" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077015", "reference_id": "1077015", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496", "reference_id": "CVE-2014-1496", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-16", "reference_id": "mfsa2014-16", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1496" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrd-xcq5-67aj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61216?format=api", "vulnerability_id": "VCID-ypmc-2484-3fev", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00548", "scoring_system": "epss", "scoring_elements": "0.67943", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1498" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077018", "reference_id": "1077018", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498", "reference_id": "CVE-2014-1498", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-18", "reference_id": "mfsa2014-18", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-18" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1498" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmc-2484-3fev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61283?format=api", "vulnerability_id": "VCID-yu2w-6fdx-93aq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81969", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8635" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180963", "reference_id": "1180963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635", "reference_id": "CVE-2014-8635", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01", "reference_id": "mfsa2015-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-8635" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yu2w-6fdx-93aq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56911?format=api", "vulnerability_id": "VCID-yujw-37a2-h7b9", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0741.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0742.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.87003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86998", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.86983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03197", "scoring_system": "epss", "scoring_elements": "0.8699", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1533" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009952" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=921622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=921622" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=967354", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=967354" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978811" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988719" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=991981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=991981" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=992274", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=992274" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=994907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=994907" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995679" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=996715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=996715" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=999651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=999651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" }, { "reference_url": "http://secunia.com/advisories/58984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58984" }, { "reference_url": "http://secunia.com/advisories/59052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59052" }, { "reference_url": "http://secunia.com/advisories/59149", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59149" }, { "reference_url": "http://secunia.com/advisories/59150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59150" }, { "reference_url": "http://secunia.com/advisories/59165", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59165" }, { "reference_url": "http://secunia.com/advisories/59169", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59169" }, { "reference_url": "http://secunia.com/advisories/59170", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59170" }, { "reference_url": "http://secunia.com/advisories/59171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59171" }, { "reference_url": "http://secunia.com/advisories/59229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59229" }, { "reference_url": "http://secunia.com/advisories/59275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59275" }, { "reference_url": "http://secunia.com/advisories/59328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59328" }, { "reference_url": "http://secunia.com/advisories/59377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59377" }, { "reference_url": "http://secunia.com/advisories/59387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59387" }, { "reference_url": "http://secunia.com/advisories/59425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59425" }, { "reference_url": "http://secunia.com/advisories/59486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59486" }, { "reference_url": "http://secunia.com/advisories/59866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59866" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2955" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2960", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2960" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/67965", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/67965" }, { "reference_url": "http://www.securitytracker.com/id/1030386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030386" }, { "reference_url": "http://www.securitytracker.com/id/1030388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030388" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2243-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2243-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2250-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2250-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107399", "reference_id": "1107399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1533", "reference_id": "CVE-2014-1533", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1533" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-48", "reference_id": "mfsa2014-48", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-48" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0741", "reference_id": "RHSA-2014:0741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0742", "reference_id": "RHSA-2014:0742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0742" }, { "reference_url": "https://usn.ubuntu.com/2243-1/", "reference_id": "USN-2243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2243-1/" }, { "reference_url": "https://usn.ubuntu.com/2250-1/", "reference_id": "USN-2250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2250-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1533" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yujw-37a2-h7b9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61201?format=api", "vulnerability_id": "VCID-yv1t-4nze-rqf6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83648", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83661", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83725", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5615" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039430", "reference_id": "1039430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615", "reference_id": "CVE-2013-5615", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-115", "reference_id": "mfsa2013-115", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-115" }, { "reference_url": "https://usn.ubuntu.com/2052-1/", "reference_id": "USN-2052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2052-1/" }, { "reference_url": "https://usn.ubuntu.com/2053-1/", "reference_id": "USN-2053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2053-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2013-5615" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yv1t-4nze-rqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56977?format=api", "vulnerability_id": "VCID-za1s-65ue-nqdz", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.7194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71867", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71905", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71917", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1585" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1062876", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1062876" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-81.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-81.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70425" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152366", "reference_id": "1152366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152366" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1585", "reference_id": "CVE-2014-1585", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1585" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-81", "reference_id": "mfsa2014-81", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-81" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1585" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-za1s-65ue-nqdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=api", "vulnerability_id": "VCID-zeyg-dbfj-93eg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84359", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84326", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620", "reference_id": "1195620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829", "reference_id": "CVE-2015-0829", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17", "reference_id": "mfsa2015-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0829" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56707?format=api", "vulnerability_id": "VCID-zrvg-5xgk-cqc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.8869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88659", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.8866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88678", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04165", "scoring_system": "epss", "scoring_elements": "0.88689", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494", "reference_id": "1077494", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-32", "reference_id": "mfsa2014-32", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0310", "reference_id": "RHSA-2014:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0316", "reference_id": "RHSA-2014:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "reference_url": "https://usn.ubuntu.com/2150-1/", "reference_id": "USN-2150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2150-1/" }, { "reference_url": "https://usn.ubuntu.com/2151-1/", "reference_id": "USN-2151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2014-1514" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrvg-5xgk-cqc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=api", "vulnerability_id": "VCID-zxvq-vk4c-ebd9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610", "reference_id": "1195610", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832", "reference_id": "CVE-2015-0832", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13", "reference_id": "mfsa2015-13", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85543?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@2.33.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85544?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85545?format=api", "purl": "pkg:ebuild/www-client/seamonkey-bin@31.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3" } ], "aliases": [ "CVE-2015-0832" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0" }