Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Thunderbird@38.6.0
Typemozilla
Namespace
NameThunderbird
Version38.6.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version38.7.0
Latest_non_vulnerable_version149.0.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-89g9-adnb-jbcb
vulnerability_id VCID-89g9-adnb-jbcb
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
reference_id
reference_type
scores
url http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0197.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0197.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0258.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0258.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0594.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0594.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1523.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1523.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1523
reference_id
reference_type
scores
0
value 0.01341
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-21T12:55:00Z
1
value 0.01341
scoring_system epss
scoring_elements 0.7997
published_at 2026-04-01T12:55:00Z
2
value 0.01341
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-12T12:55:00Z
3
value 0.01341
scoring_system epss
scoring_elements 0.80022
published_at 2026-04-13T12:55:00Z
4
value 0.01341
scoring_system epss
scoring_elements 0.8005
published_at 2026-04-18T12:55:00Z
5
value 0.01341
scoring_system epss
scoring_elements 0.79977
published_at 2026-04-02T12:55:00Z
6
value 0.01341
scoring_system epss
scoring_elements 0.79999
published_at 2026-04-04T12:55:00Z
7
value 0.01341
scoring_system epss
scoring_elements 0.79989
published_at 2026-04-07T12:55:00Z
8
value 0.01341
scoring_system epss
scoring_elements 0.80017
published_at 2026-04-08T12:55:00Z
9
value 0.01341
scoring_system epss
scoring_elements 0.80026
published_at 2026-04-09T12:55:00Z
10
value 0.01341
scoring_system epss
scoring_elements 0.80046
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1523
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1969
22
reference_url http://www.debian.org/security/2016/dsa-3477
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3477
23
reference_url http://www.debian.org/security/2016/dsa-3479
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3479
24
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
25
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
27
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
28
reference_url http://www.securityfocus.com/bid/82991
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82991
29
reference_url http://www.securitytracker.com/id/1035017
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035017
30
reference_url http://www.ubuntu.com/usn/USN-2902-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2902-1
31
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1305813
reference_id 1305813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1305813
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1523
reference_id CVE-2016-1523
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1523
53
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
54
reference_url https://security.gentoo.org/glsa/201701-35
reference_id GLSA-201701-35
reference_type
scores
url https://security.gentoo.org/glsa/201701-35
55
reference_url https://security.gentoo.org/glsa/201701-63
reference_id GLSA-201701-63
reference_type
scores
url https://security.gentoo.org/glsa/201701-63
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-14
reference_id mfsa2016-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-14
57
reference_url https://access.redhat.com/errata/RHSA-2016:0197
reference_id RHSA-2016:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0197
58
reference_url https://access.redhat.com/errata/RHSA-2016:0258
reference_id RHSA-2016:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0258
59
reference_url https://access.redhat.com/errata/RHSA-2016:0594
reference_id RHSA-2016:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0594
60
reference_url https://usn.ubuntu.com/2902-1/
reference_id USN-2902-1
reference_type
scores
url https://usn.ubuntu.com/2902-1/
61
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:mozilla/Thunderbird@38.6.0
purl pkg:mozilla/Thunderbird@38.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.6.0
aliases CVE-2016-1523
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89g9-adnb-jbcb
1
url VCID-k4qs-aaqm-eucb
vulnerability_id VCID-k4qs-aaqm-eucb
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0071.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0071.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0258.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0258.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1935.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1935.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1935
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.64035
published_at 2026-04-21T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63919
published_at 2026-04-01T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-12T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.64001
published_at 2026-04-13T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.64036
published_at 2026-04-16T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.64048
published_at 2026-04-18T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.63977
published_at 2026-04-02T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64005
published_at 2026-04-04T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.63965
published_at 2026-04-07T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64015
published_at 2026-04-08T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64032
published_at 2026-04-09T12:55:00Z
11
value 0.00458
scoring_system epss
scoring_elements 0.64044
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1935
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
18
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
19
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
21
reference_url http://www.securityfocus.com/bid/81952
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81952
22
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
23
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
24
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
25
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301821
reference_id 1301821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301821
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1935
reference_id CVE-2016-1935
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1935
41
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-03
reference_id mfsa2016-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-03
43
reference_url https://access.redhat.com/errata/RHSA-2016:0071
reference_id RHSA-2016:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0071
44
reference_url https://access.redhat.com/errata/RHSA-2016:0258
reference_id RHSA-2016:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0258
45
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
46
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:mozilla/Thunderbird@38.6.0
purl pkg:mozilla/Thunderbird@38.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.6.0
aliases CVE-2016-1935
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4qs-aaqm-eucb
2
url VCID-my4s-k6en-qkc2
vulnerability_id VCID-my4s-k6en-qkc2
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0071.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0071.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0258.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0258.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1930.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1930.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1930
reference_id
reference_type
scores
0
value 0.0186
scoring_system epss
scoring_elements 0.83086
published_at 2026-04-21T12:55:00Z
1
value 0.0186
scoring_system epss
scoring_elements 0.8298
published_at 2026-04-01T12:55:00Z
2
value 0.0186
scoring_system epss
scoring_elements 0.83049
published_at 2026-04-12T12:55:00Z
3
value 0.0186
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-13T12:55:00Z
4
value 0.0186
scoring_system epss
scoring_elements 0.83083
published_at 2026-04-18T12:55:00Z
5
value 0.0186
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-02T12:55:00Z
6
value 0.0186
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-04T12:55:00Z
7
value 0.0186
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-07T12:55:00Z
8
value 0.0186
scoring_system epss
scoring_elements 0.83032
published_at 2026-04-08T12:55:00Z
9
value 0.0186
scoring_system epss
scoring_elements 0.83039
published_at 2026-04-09T12:55:00Z
10
value 0.0186
scoring_system epss
scoring_elements 0.83055
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1930
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
27
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
28
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
29
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
30
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
31
reference_url http://www.securityfocus.com/bid/81953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81953
32
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
33
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
34
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
35
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301818
reference_id 1301818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301818
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1930
reference_id CVE-2016-1930
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1930
51
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-01
reference_id mfsa2016-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-01
53
reference_url https://access.redhat.com/errata/RHSA-2016:0071
reference_id RHSA-2016:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0071
54
reference_url https://access.redhat.com/errata/RHSA-2016:0258
reference_id RHSA-2016:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0258
55
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
56
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:mozilla/Thunderbird@38.6.0
purl pkg:mozilla/Thunderbird@38.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.6.0
aliases CVE-2016-1930
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my4s-k6en-qkc2
3
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-18T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81226
published_at 2026-04-21T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
8
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
9
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:mozilla/Thunderbird@38.6.0
purl pkg:mozilla/Thunderbird@38.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.6.0
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.6.0