Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Seamonkey@2.20.0
Typemozilla
Namespace
NameSeamonkey
Version2.20.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.21.0
Latest_non_vulnerable_version2.31.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1twv-z77f-yqfb
vulnerability_id VCID-1twv-z77f-yqfb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1714.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1714
reference_id
reference_type
scores
0
value 0.01083
scoring_system epss
scoring_elements 0.77897
published_at 2026-04-21T12:55:00Z
1
value 0.01083
scoring_system epss
scoring_elements 0.77808
published_at 2026-04-01T12:55:00Z
2
value 0.01083
scoring_system epss
scoring_elements 0.77815
published_at 2026-04-02T12:55:00Z
3
value 0.01083
scoring_system epss
scoring_elements 0.77842
published_at 2026-04-04T12:55:00Z
4
value 0.01083
scoring_system epss
scoring_elements 0.77824
published_at 2026-04-07T12:55:00Z
5
value 0.01083
scoring_system epss
scoring_elements 0.77852
published_at 2026-04-08T12:55:00Z
6
value 0.01083
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-09T12:55:00Z
7
value 0.01083
scoring_system epss
scoring_elements 0.77884
published_at 2026-04-11T12:55:00Z
8
value 0.01083
scoring_system epss
scoring_elements 0.77868
published_at 2026-04-13T12:55:00Z
9
value 0.01083
scoring_system epss
scoring_elements 0.77904
published_at 2026-04-16T12:55:00Z
10
value 0.01083
scoring_system epss
scoring_elements 0.77903
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993604
reference_id 993604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993604
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-73
reference_id mfsa2013-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-73
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1714
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1twv-z77f-yqfb
1
url VCID-3f3t-kpkz-hfh2
vulnerability_id VCID-3f3t-kpkz-hfh2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1710.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1710
reference_id
reference_type
scores
0
value 0.76472
scoring_system epss
scoring_elements 0.98942
published_at 2026-04-21T12:55:00Z
1
value 0.76472
scoring_system epss
scoring_elements 0.98927
published_at 2026-04-01T12:55:00Z
2
value 0.76472
scoring_system epss
scoring_elements 0.98928
published_at 2026-04-02T12:55:00Z
3
value 0.76472
scoring_system epss
scoring_elements 0.9893
published_at 2026-04-04T12:55:00Z
4
value 0.76472
scoring_system epss
scoring_elements 0.98932
published_at 2026-04-07T12:55:00Z
5
value 0.76472
scoring_system epss
scoring_elements 0.98934
published_at 2026-04-09T12:55:00Z
6
value 0.76472
scoring_system epss
scoring_elements 0.98936
published_at 2026-04-11T12:55:00Z
7
value 0.76472
scoring_system epss
scoring_elements 0.98937
published_at 2026-04-13T12:55:00Z
8
value 0.76472
scoring_system epss
scoring_elements 0.9894
published_at 2026-04-16T12:55:00Z
9
value 0.76472
scoring_system epss
scoring_elements 0.98941
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993602
reference_id 993602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993602
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-69
reference_id mfsa2013-69
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-69
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1710
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f3t-kpkz-hfh2
2
url VCID-47jt-1cd2-r7g8
vulnerability_id VCID-47jt-1cd2-r7g8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1708.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1708
reference_id
reference_type
scores
0
value 0.05278
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-21T12:55:00Z
1
value 0.05278
scoring_system epss
scoring_elements 0.8996
published_at 2026-04-01T12:55:00Z
2
value 0.05278
scoring_system epss
scoring_elements 0.89963
published_at 2026-04-02T12:55:00Z
3
value 0.05278
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-04T12:55:00Z
4
value 0.05278
scoring_system epss
scoring_elements 0.89981
published_at 2026-04-07T12:55:00Z
5
value 0.05278
scoring_system epss
scoring_elements 0.89997
published_at 2026-04-08T12:55:00Z
6
value 0.05278
scoring_system epss
scoring_elements 0.90003
published_at 2026-04-13T12:55:00Z
7
value 0.05278
scoring_system epss
scoring_elements 0.90011
published_at 2026-04-11T12:55:00Z
8
value 0.05278
scoring_system epss
scoring_elements 0.90009
published_at 2026-04-12T12:55:00Z
9
value 0.05278
scoring_system epss
scoring_elements 0.90018
published_at 2026-04-16T12:55:00Z
10
value 0.05278
scoring_system epss
scoring_elements 0.90019
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1708
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=994337
reference_id 994337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=994337
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708
reference_id CVE-2013-1708
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-67
reference_id mfsa2013-67
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-67
6
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1708
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47jt-1cd2-r7g8
3
url VCID-8tpd-hn73-byb1
vulnerability_id VCID-8tpd-hn73-byb1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1713.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1713
reference_id
reference_type
scores
0
value 0.00466
scoring_system epss
scoring_elements 0.64419
published_at 2026-04-21T12:55:00Z
1
value 0.00466
scoring_system epss
scoring_elements 0.64303
published_at 2026-04-01T12:55:00Z
2
value 0.00466
scoring_system epss
scoring_elements 0.64357
published_at 2026-04-02T12:55:00Z
3
value 0.00466
scoring_system epss
scoring_elements 0.64386
published_at 2026-04-04T12:55:00Z
4
value 0.00466
scoring_system epss
scoring_elements 0.64345
published_at 2026-04-07T12:55:00Z
5
value 0.00466
scoring_system epss
scoring_elements 0.64394
published_at 2026-04-08T12:55:00Z
6
value 0.00466
scoring_system epss
scoring_elements 0.64409
published_at 2026-04-12T12:55:00Z
7
value 0.00466
scoring_system epss
scoring_elements 0.64421
published_at 2026-04-11T12:55:00Z
8
value 0.00466
scoring_system epss
scoring_elements 0.6438
published_at 2026-04-13T12:55:00Z
9
value 0.00466
scoring_system epss
scoring_elements 0.64416
published_at 2026-04-16T12:55:00Z
10
value 0.00466
scoring_system epss
scoring_elements 0.64427
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993603
reference_id 993603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993603
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-72
reference_id mfsa2013-72
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-72
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1713
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpd-hn73-byb1
4
url VCID-9r42-jkpn-sue9
vulnerability_id VCID-9r42-jkpn-sue9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1705.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1705
reference_id
reference_type
scores
0
value 0.05283
scoring_system epss
scoring_elements 0.90021
published_at 2026-04-21T12:55:00Z
1
value 0.05283
scoring_system epss
scoring_elements 0.89965
published_at 2026-04-01T12:55:00Z
2
value 0.05283
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-02T12:55:00Z
3
value 0.05283
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-04T12:55:00Z
4
value 0.05283
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-07T12:55:00Z
5
value 0.05283
scoring_system epss
scoring_elements 0.90002
published_at 2026-04-08T12:55:00Z
6
value 0.05283
scoring_system epss
scoring_elements 0.90007
published_at 2026-04-09T12:55:00Z
7
value 0.05283
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-11T12:55:00Z
8
value 0.05283
scoring_system epss
scoring_elements 0.90014
published_at 2026-04-12T12:55:00Z
9
value 0.05283
scoring_system epss
scoring_elements 0.90008
published_at 2026-04-13T12:55:00Z
10
value 0.05283
scoring_system epss
scoring_elements 0.90023
published_at 2026-04-16T12:55:00Z
11
value 0.05283
scoring_system epss
scoring_elements 0.90024
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1705
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=994335
reference_id 994335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=994335
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705
reference_id CVE-2013-1705
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-65
reference_id mfsa2013-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-65
6
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9r42-jkpn-sue9
5
url VCID-mue1-gvrf-27e2
vulnerability_id VCID-mue1-gvrf-27e2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1709.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1709
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66873
published_at 2026-04-21T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-01T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66809
published_at 2026-04-02T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66834
published_at 2026-04-04T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.66807
published_at 2026-04-07T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66856
published_at 2026-04-08T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-09T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-11T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66875
published_at 2026-04-12T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66843
published_at 2026-04-13T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-16T12:55:00Z
11
value 0.00521
scoring_system epss
scoring_elements 0.6689
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993600
reference_id 993600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993600
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-68
reference_id mfsa2013-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-68
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1709
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mue1-gvrf-27e2
6
url VCID-nutc-y3ue-tkdd
vulnerability_id VCID-nutc-y3ue-tkdd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1717.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1717
reference_id
reference_type
scores
0
value 0.0057
scoring_system epss
scoring_elements 0.68641
published_at 2026-04-18T12:55:00Z
1
value 0.0057
scoring_system epss
scoring_elements 0.68523
published_at 2026-04-01T12:55:00Z
2
value 0.0057
scoring_system epss
scoring_elements 0.68541
published_at 2026-04-02T12:55:00Z
3
value 0.0057
scoring_system epss
scoring_elements 0.6856
published_at 2026-04-04T12:55:00Z
4
value 0.0057
scoring_system epss
scoring_elements 0.68538
published_at 2026-04-07T12:55:00Z
5
value 0.0057
scoring_system epss
scoring_elements 0.68589
published_at 2026-04-08T12:55:00Z
6
value 0.0057
scoring_system epss
scoring_elements 0.68606
published_at 2026-04-09T12:55:00Z
7
value 0.0057
scoring_system epss
scoring_elements 0.68632
published_at 2026-04-11T12:55:00Z
8
value 0.0057
scoring_system epss
scoring_elements 0.68619
published_at 2026-04-21T12:55:00Z
9
value 0.0057
scoring_system epss
scoring_elements 0.6859
published_at 2026-04-13T12:55:00Z
10
value 0.0057
scoring_system epss
scoring_elements 0.68629
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993605
reference_id 993605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993605
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-75
reference_id mfsa2013-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-75
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1717
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nutc-y3ue-tkdd
7
url VCID-p9xu-m3ac-ukf9
vulnerability_id VCID-p9xu-m3ac-ukf9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1701.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1701
reference_id
reference_type
scores
0
value 0.03551
scoring_system epss
scoring_elements 0.87704
published_at 2026-04-21T12:55:00Z
1
value 0.03551
scoring_system epss
scoring_elements 0.87639
published_at 2026-04-01T12:55:00Z
2
value 0.03551
scoring_system epss
scoring_elements 0.87649
published_at 2026-04-02T12:55:00Z
3
value 0.03551
scoring_system epss
scoring_elements 0.87662
published_at 2026-04-04T12:55:00Z
4
value 0.03551
scoring_system epss
scoring_elements 0.87663
published_at 2026-04-07T12:55:00Z
5
value 0.03551
scoring_system epss
scoring_elements 0.87684
published_at 2026-04-08T12:55:00Z
6
value 0.03551
scoring_system epss
scoring_elements 0.8769
published_at 2026-04-09T12:55:00Z
7
value 0.03551
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-11T12:55:00Z
8
value 0.03551
scoring_system epss
scoring_elements 0.87695
published_at 2026-04-12T12:55:00Z
9
value 0.03551
scoring_system epss
scoring_elements 0.87693
published_at 2026-04-13T12:55:00Z
10
value 0.03551
scoring_system epss
scoring_elements 0.87708
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1701
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=993598
reference_id 993598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=993598
9
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-63
reference_id mfsa2013-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-63
11
reference_url https://access.redhat.com/errata/RHSA-2013:1140
reference_id RHSA-2013:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1140
12
reference_url https://access.redhat.com/errata/RHSA-2013:1142
reference_id RHSA-2013:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1142
13
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
14
reference_url https://usn.ubuntu.com/1925-1/
reference_id USN-1925-1
reference_type
scores
url https://usn.ubuntu.com/1925-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1701
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xu-m3ac-ukf9
8
url VCID-ph4p-zt8k-tfcv
vulnerability_id VCID-ph4p-zt8k-tfcv
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1704
reference_id
reference_type
scores
0
value 0.04703
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-21T12:55:00Z
1
value 0.04703
scoring_system epss
scoring_elements 0.8932
published_at 2026-04-01T12:55:00Z
2
value 0.04703
scoring_system epss
scoring_elements 0.89326
published_at 2026-04-02T12:55:00Z
3
value 0.04703
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-04T12:55:00Z
4
value 0.04703
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-07T12:55:00Z
5
value 0.04703
scoring_system epss
scoring_elements 0.89356
published_at 2026-04-08T12:55:00Z
6
value 0.04703
scoring_system epss
scoring_elements 0.89361
published_at 2026-04-09T12:55:00Z
7
value 0.04703
scoring_system epss
scoring_elements 0.89369
published_at 2026-04-11T12:55:00Z
8
value 0.04703
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-12T12:55:00Z
9
value 0.04703
scoring_system epss
scoring_elements 0.89362
published_at 2026-04-13T12:55:00Z
10
value 0.04703
scoring_system epss
scoring_elements 0.89378
published_at 2026-04-16T12:55:00Z
11
value 0.04703
scoring_system epss
scoring_elements 0.89377
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1704
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=994334
reference_id 994334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=994334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704
reference_id CVE-2013-1704
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-64
reference_id mfsa2013-64
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-64
6
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1704
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph4p-zt8k-tfcv
9
url VCID-rf4b-gj55-f3c2
vulnerability_id VCID-rf4b-gj55-f3c2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1712
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37599
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37781
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37807
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37685
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37735
published_at 2026-04-08T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37748
published_at 2026-04-09T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37762
published_at 2026-04-11T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37727
published_at 2026-04-12T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.377
published_at 2026-04-13T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37749
published_at 2026-04-16T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37729
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1712
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1712
reference_id CVE-2013-1712
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1712
2
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-71
reference_id mfsa2013-71
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-71
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1712
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf4b-gj55-f3c2
10
url VCID-s5ft-2c2k-vbcp
vulnerability_id VCID-s5ft-2c2k-vbcp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1711.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1711
reference_id
reference_type
scores
0
value 0.01865
scoring_system epss
scoring_elements 0.83104
published_at 2026-04-21T12:55:00Z
1
value 0.01865
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-01T12:55:00Z
2
value 0.01865
scoring_system epss
scoring_elements 0.83013
published_at 2026-04-02T12:55:00Z
3
value 0.01865
scoring_system epss
scoring_elements 0.83026
published_at 2026-04-04T12:55:00Z
4
value 0.01865
scoring_system epss
scoring_elements 0.83024
published_at 2026-04-07T12:55:00Z
5
value 0.01865
scoring_system epss
scoring_elements 0.83049
published_at 2026-04-08T12:55:00Z
6
value 0.01865
scoring_system epss
scoring_elements 0.83056
published_at 2026-04-09T12:55:00Z
7
value 0.01865
scoring_system epss
scoring_elements 0.83072
published_at 2026-04-11T12:55:00Z
8
value 0.01865
scoring_system epss
scoring_elements 0.83066
published_at 2026-04-12T12:55:00Z
9
value 0.01865
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-13T12:55:00Z
10
value 0.01865
scoring_system epss
scoring_elements 0.831
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1711
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=994339
reference_id 994339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=994339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711
reference_id CVE-2013-1711
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-70
reference_id mfsa2013-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-70
6
reference_url https://usn.ubuntu.com/1924-1/
reference_id USN-1924-1
reference_type
scores
url https://usn.ubuntu.com/1924-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1711
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5ft-2c2k-vbcp
11
url VCID-xrw9-71ea-uqem
vulnerability_id VCID-xrw9-71ea-uqem
summary
Security researcher Robert Kugler reported
in 2012 that when a specifically named DLL file on a Windows computer is
placed in the default downloads directory with the Firefox installer, the
Firefox installer will load this DLL file when it is launched. Mozilla
developers Brian Bondy and Robert Strong then
discovered that the stub installer was vulnerable to this same issue with a
number of DLL files and there were additionally vulnerable named DLL files with
the full installer. In circumstances where an installer is run by an
administrator privileged account, this allows for a downloaded DLL file to be
run with those administrator privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1715
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37599
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37781
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37807
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37685
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37735
published_at 2026-04-08T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37748
published_at 2026-04-09T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37762
published_at 2026-04-11T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37727
published_at 2026-04-12T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.377
published_at 2026-04-13T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37749
published_at 2026-04-16T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37729
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1715
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1715
reference_id CVE-2013-1715
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1715
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-74
reference_id mfsa2013-74
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-74
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1715
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrw9-71ea-uqem
12
url VCID-yyxz-1qxq-bqhg
vulnerability_id VCID-yyxz-1qxq-bqhg
summary
Security researcher Seb Patane reported stack buffer
overflows in both the Maintenance Service and the Mozilla Updater when
unexpectedly long paths were encountered. A local attacker could pass these as
command-line arguments to the Maintenance Service to crash either program and
potentially lead to arbitrary code being run with the Administrator privileges
used by the Maintenance Service and inherited by the Updater.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1706
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15241
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-01T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15397
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15466
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.1527
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15407
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15369
published_at 2026-04-11T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.1533
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15264
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15178
published_at 2026-04-16T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15186
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706
reference_id CVE-2013-1706
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-66
reference_id mfsa2013-66
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-66
fixed_packages
0
url pkg:mozilla/Seamonkey@2.20.0
purl pkg:mozilla/Seamonkey@2.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0
aliases CVE-2013-1706
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyxz-1qxq-bqhg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0