Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Seamonkey@2.23.0
Typemozilla
Namespace
NameSeamonkey
Version2.23.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.24.0
Latest_non_vulnerable_version2.31.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5wtn-t32h-xyg7
vulnerability_id VCID-5wtn-t32h-xyg7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6672
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76133
published_at 2026-04-21T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-01T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76047
published_at 2026-04-02T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-04T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-07T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-08T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-09T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-11T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76108
published_at 2026-04-12T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76105
published_at 2026-04-13T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.76146
published_at 2026-04-16T12:55:00Z
11
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6672
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039427
reference_id 1039427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039427
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672
reference_id CVE-2013-6672
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-112
reference_id mfsa2013-112
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-112
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-6672
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtn-t32h-xyg7
1
url VCID-62px-695g-57bk
vulnerability_id VCID-62px-695g-57bk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
reference_id
reference_type
scores
0
value 0.11056
scoring_system epss
scoring_elements 0.93476
published_at 2026-04-21T12:55:00Z
1
value 0.11056
scoring_system epss
scoring_elements 0.93411
published_at 2026-04-01T12:55:00Z
2
value 0.11056
scoring_system epss
scoring_elements 0.93418
published_at 2026-04-02T12:55:00Z
3
value 0.11056
scoring_system epss
scoring_elements 0.93426
published_at 2026-04-04T12:55:00Z
4
value 0.11056
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-07T12:55:00Z
5
value 0.11056
scoring_system epss
scoring_elements 0.93435
published_at 2026-04-08T12:55:00Z
6
value 0.11056
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-09T12:55:00Z
7
value 0.11056
scoring_system epss
scoring_elements 0.93444
published_at 2026-04-12T12:55:00Z
8
value 0.11056
scoring_system epss
scoring_elements 0.93445
published_at 2026-04-13T12:55:00Z
9
value 0.11056
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-16T12:55:00Z
10
value 0.11056
scoring_system epss
scoring_elements 0.93469
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5613
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
reference_id 1039429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039429
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
reference_id CVE-2013-5613
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
reference_id mfsa2013-114
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-114
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5613
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk
2
url VCID-69g6-8d1a-kubz
vulnerability_id VCID-69g6-8d1a-kubz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
reference_id
reference_type
scores
0
value 0.10399
scoring_system epss
scoring_elements 0.93242
published_at 2026-04-21T12:55:00Z
1
value 0.10399
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-01T12:55:00Z
2
value 0.10399
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-02T12:55:00Z
3
value 0.10399
scoring_system epss
scoring_elements 0.932
published_at 2026-04-04T12:55:00Z
4
value 0.10399
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-07T12:55:00Z
5
value 0.10399
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-08T12:55:00Z
6
value 0.10399
scoring_system epss
scoring_elements 0.9321
published_at 2026-04-09T12:55:00Z
7
value 0.10399
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-11T12:55:00Z
8
value 0.10399
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-12T12:55:00Z
9
value 0.10399
scoring_system epss
scoring_elements 0.93214
published_at 2026-04-13T12:55:00Z
10
value 0.10399
scoring_system epss
scoring_elements 0.9323
published_at 2026-04-16T12:55:00Z
11
value 0.10399
scoring_system epss
scoring_elements 0.93234
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6671
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
reference_id 1039426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
reference_id CVE-2013-6671
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
reference_id mfsa2013-111
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-111
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-6671
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz
3
url VCID-6qse-ddhe-f7ea
vulnerability_id VCID-6qse-ddhe-f7ea
summary
Two vulnerabilities have been discovered in libjpeg-turbo, the
    worse of which could allow remote attackers access to  sensitive
    information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6629
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43435
published_at 2026-04-21T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43386
published_at 2026-04-01T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43511
published_at 2026-04-16T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.435
published_at 2026-04-18T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43448
published_at 2026-04-02T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43475
published_at 2026-04-04T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43413
published_at 2026-04-07T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43464
published_at 2026-04-08T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43479
published_at 2026-04-09T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43497
published_at 2026-04-11T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43466
published_at 2026-04-12T12:55:00Z
11
value 0.0021
scoring_system epss
scoring_elements 0.43451
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6802
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
41
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031734
reference_id 1031734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031734
43
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729867
reference_id 729867
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729867
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729873
reference_id 729873
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729873
45
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
46
reference_url https://security.gentoo.org/glsa/201606-03
reference_id GLSA-201606-03
reference_type
scores
url https://security.gentoo.org/glsa/201606-03
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-116
reference_id mfsa2013-116
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-116
48
reference_url https://access.redhat.com/errata/RHSA-2013:1803
reference_id RHSA-2013:1803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1803
49
reference_url https://access.redhat.com/errata/RHSA-2013:1804
reference_id RHSA-2013:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1804
50
reference_url https://access.redhat.com/errata/RHSA-2014:0412
reference_id RHSA-2014:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0412
51
reference_url https://access.redhat.com/errata/RHSA-2014:0413
reference_id RHSA-2014:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0413
52
reference_url https://access.redhat.com/errata/RHSA-2014:0486
reference_id RHSA-2014:0486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0486
53
reference_url https://access.redhat.com/errata/RHSA-2014:0508
reference_id RHSA-2014:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0508
54
reference_url https://access.redhat.com/errata/RHSA-2014:0509
reference_id RHSA-2014:0509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0509
55
reference_url https://access.redhat.com/errata/RHSA-2014:0705
reference_id RHSA-2014:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0705
56
reference_url https://access.redhat.com/errata/RHSA-2014:0982
reference_id RHSA-2014:0982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0982
57
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
58
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
59
reference_url https://usn.ubuntu.com/2060-1/
reference_id USN-2060-1
reference_type
scores
url https://usn.ubuntu.com/2060-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-6629
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qse-ddhe-f7ea
4
url VCID-b2k8-kjmq-1kh4
vulnerability_id VCID-b2k8-kjmq-1kh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
reference_id
reference_type
scores
0
value 0.10378
scoring_system epss
scoring_elements 0.93235
published_at 2026-04-21T12:55:00Z
1
value 0.10378
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-01T12:55:00Z
2
value 0.10378
scoring_system epss
scoring_elements 0.93189
published_at 2026-04-02T12:55:00Z
3
value 0.10378
scoring_system epss
scoring_elements 0.93193
published_at 2026-04-04T12:55:00Z
4
value 0.10378
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-07T12:55:00Z
5
value 0.10378
scoring_system epss
scoring_elements 0.93199
published_at 2026-04-08T12:55:00Z
6
value 0.10378
scoring_system epss
scoring_elements 0.93204
published_at 2026-04-09T12:55:00Z
7
value 0.10378
scoring_system epss
scoring_elements 0.93208
published_at 2026-04-11T12:55:00Z
8
value 0.10378
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-12T12:55:00Z
9
value 0.10378
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-13T12:55:00Z
10
value 0.10378
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-16T12:55:00Z
11
value 0.10378
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5618
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
reference_id 1039423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
reference_id CVE-2013-5618
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
reference_id mfsa2013-109
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-109
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5618
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4
5
url VCID-cnc6-yyk1-zqc3
vulnerability_id VCID-cnc6-yyk1-zqc3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6673
reference_id
reference_type
scores
0
value 0.00545
scoring_system epss
scoring_elements 0.67806
published_at 2026-04-21T12:55:00Z
1
value 0.00545
scoring_system epss
scoring_elements 0.677
published_at 2026-04-01T12:55:00Z
2
value 0.00545
scoring_system epss
scoring_elements 0.67734
published_at 2026-04-02T12:55:00Z
3
value 0.00545
scoring_system epss
scoring_elements 0.67755
published_at 2026-04-04T12:55:00Z
4
value 0.00545
scoring_system epss
scoring_elements 0.67735
published_at 2026-04-07T12:55:00Z
5
value 0.00545
scoring_system epss
scoring_elements 0.67786
published_at 2026-04-08T12:55:00Z
6
value 0.00545
scoring_system epss
scoring_elements 0.67801
published_at 2026-04-09T12:55:00Z
7
value 0.00545
scoring_system epss
scoring_elements 0.67824
published_at 2026-04-11T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.6781
published_at 2026-04-12T12:55:00Z
9
value 0.00545
scoring_system epss
scoring_elements 0.67776
published_at 2026-04-13T12:55:00Z
10
value 0.00545
scoring_system epss
scoring_elements 0.67812
published_at 2026-04-16T12:55:00Z
11
value 0.00545
scoring_system epss
scoring_elements 0.67825
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6673
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039428
reference_id 1039428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673
reference_id CVE-2013-6673
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-113
reference_id mfsa2013-113
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-113
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
7
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-6673
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnc6-yyk1-zqc3
6
url VCID-db94-kcvc-zybp
vulnerability_id VCID-db94-kcvc-zybp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
reference_id
reference_type
scores
0
value 0.02874
scoring_system epss
scoring_elements 0.86292
published_at 2026-04-21T12:55:00Z
1
value 0.02874
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-01T12:55:00Z
2
value 0.02874
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-02T12:55:00Z
3
value 0.02874
scoring_system epss
scoring_elements 0.86239
published_at 2026-04-04T12:55:00Z
4
value 0.02874
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-07T12:55:00Z
5
value 0.02874
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-08T12:55:00Z
6
value 0.02874
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-09T12:55:00Z
7
value 0.02874
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-11T12:55:00Z
8
value 0.02874
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-12T12:55:00Z
9
value 0.02874
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-13T12:55:00Z
10
value 0.02874
scoring_system epss
scoring_elements 0.86294
published_at 2026-04-16T12:55:00Z
11
value 0.02874
scoring_system epss
scoring_elements 0.86298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5616
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
reference_id 1039422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039422
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
reference_id CVE-2013-5616
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
reference_id mfsa2013-108
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-108
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp
7
url VCID-gsx1-3jjx-nqan
vulnerability_id VCID-gsx1-3jjx-nqan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.7294
published_at 2026-04-21T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.72842
published_at 2026-04-01T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-02T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72869
published_at 2026-04-04T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72844
published_at 2026-04-07T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72882
published_at 2026-04-08T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72896
published_at 2026-04-13T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72921
published_at 2026-04-11T12:55:00Z
8
value 0.00739
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-12T12:55:00Z
9
value 0.00739
scoring_system epss
scoring_elements 0.72937
published_at 2026-04-16T12:55:00Z
10
value 0.00739
scoring_system epss
scoring_elements 0.72947
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
reference_id 1039420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
reference_id CVE-2013-5612
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
reference_id mfsa2013-106
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-106
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5612
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan
8
url VCID-k1sx-wcjc-jqcr
vulnerability_id VCID-k1sx-wcjc-jqcr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5619
reference_id
reference_type
scores
0
value 0.0173
scoring_system epss
scoring_elements 0.82495
published_at 2026-04-21T12:55:00Z
1
value 0.0173
scoring_system epss
scoring_elements 0.82381
published_at 2026-04-01T12:55:00Z
2
value 0.0173
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-02T12:55:00Z
3
value 0.0173
scoring_system epss
scoring_elements 0.82413
published_at 2026-04-04T12:55:00Z
4
value 0.0173
scoring_system epss
scoring_elements 0.8241
published_at 2026-04-07T12:55:00Z
5
value 0.0173
scoring_system epss
scoring_elements 0.82438
published_at 2026-04-08T12:55:00Z
6
value 0.0173
scoring_system epss
scoring_elements 0.82445
published_at 2026-04-09T12:55:00Z
7
value 0.0173
scoring_system epss
scoring_elements 0.82464
published_at 2026-04-11T12:55:00Z
8
value 0.0173
scoring_system epss
scoring_elements 0.82459
published_at 2026-04-12T12:55:00Z
9
value 0.0173
scoring_system epss
scoring_elements 0.82454
published_at 2026-04-13T12:55:00Z
10
value 0.0173
scoring_system epss
scoring_elements 0.8249
published_at 2026-04-16T12:55:00Z
11
value 0.0173
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5619
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039424
reference_id 1039424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039424
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619
reference_id CVE-2013-5619
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-110
reference_id mfsa2013-110
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-110
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5619
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1sx-wcjc-jqcr
9
url VCID-vg9h-jcc1-9qeg
vulnerability_id VCID-vg9h-jcc1-9qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
reference_id
reference_type
scores
0
value 0.02752
scoring_system epss
scoring_elements 0.86018
published_at 2026-04-21T12:55:00Z
1
value 0.02752
scoring_system epss
scoring_elements 0.85941
published_at 2026-04-01T12:55:00Z
2
value 0.02752
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-02T12:55:00Z
3
value 0.02752
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-04T12:55:00Z
4
value 0.02752
scoring_system epss
scoring_elements 0.85967
published_at 2026-04-07T12:55:00Z
5
value 0.02752
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-08T12:55:00Z
6
value 0.02752
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-09T12:55:00Z
7
value 0.02752
scoring_system epss
scoring_elements 0.8601
published_at 2026-04-11T12:55:00Z
8
value 0.02752
scoring_system epss
scoring_elements 0.86008
published_at 2026-04-12T12:55:00Z
9
value 0.02752
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-13T12:55:00Z
10
value 0.02752
scoring_system epss
scoring_elements 0.86022
published_at 2026-04-16T12:55:00Z
11
value 0.02752
scoring_system epss
scoring_elements 0.86026
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5609
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
reference_id 1039417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
reference_id CVE-2013-5609
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
reference_id mfsa2013-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-104
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
9
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5609
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg
10
url VCID-vhq8-wmxx-wqgt
vulnerability_id VCID-vhq8-wmxx-wqgt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51353
published_at 2026-04-21T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51227
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51278
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51303
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51263
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51318
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51315
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51358
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51337
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-16T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51373
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5614
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
reference_id 1039421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
reference_id CVE-2013-5614
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
reference_id mfsa2013-107
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-107
6
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
7
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
8
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5614
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt
11
url VCID-yv1t-4nze-rqf6
vulnerability_id VCID-yv1t-4nze-rqf6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5615
reference_id
reference_type
scores
0
value 0.02013
scoring_system epss
scoring_elements 0.8375
published_at 2026-04-21T12:55:00Z
1
value 0.02013
scoring_system epss
scoring_elements 0.83648
published_at 2026-04-01T12:55:00Z
2
value 0.02013
scoring_system epss
scoring_elements 0.83661
published_at 2026-04-02T12:55:00Z
3
value 0.02013
scoring_system epss
scoring_elements 0.83676
published_at 2026-04-04T12:55:00Z
4
value 0.02013
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-07T12:55:00Z
5
value 0.02013
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-08T12:55:00Z
6
value 0.02013
scoring_system epss
scoring_elements 0.83709
published_at 2026-04-09T12:55:00Z
7
value 0.02013
scoring_system epss
scoring_elements 0.83725
published_at 2026-04-11T12:55:00Z
8
value 0.02013
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-12T12:55:00Z
9
value 0.02013
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-13T12:55:00Z
10
value 0.02013
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5615
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039430
reference_id 1039430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1039430
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615
reference_id CVE-2013-5615
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-115
reference_id mfsa2013-115
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-115
6
reference_url https://usn.ubuntu.com/2052-1/
reference_id USN-2052-1
reference_type
scores
url https://usn.ubuntu.com/2052-1/
7
reference_url https://usn.ubuntu.com/2053-1/
reference_id USN-2053-1
reference_type
scores
url https://usn.ubuntu.com/2053-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.23.0
purl pkg:mozilla/Seamonkey@2.23.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0
aliases CVE-2013-5615
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yv1t-4nze-rqf6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0